Server Component Details
End Points used
Domain: esignet-insurance.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/auth-code
Domain: api-internal.released.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/configuration
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/binding-otp
Domain: api-internal.released.mosip.net ---- Module: idgenerator ---- End Point: v1/idgenerator/uin
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/users/me
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies
Domain: esignet-insurance.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v2/oauth-details
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/Mosip
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/identity/
Domain: api-internal.released.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/ca/upload
Domain: api-internal.released.mosip.net ---- Module: masterdata ---- End Point: v1/masterdata/actuator/health
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/credentials/download
Domain: api-internal.released.mosip.net ---- Module: masterdata ---- End Point: v1/masterdata/actuator/env
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/authenticate
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/actuator/env
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/vid
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/invalid
Domain: api-internal.released.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/upload
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/verifiers
Domain: api-internal.released.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/clientidsecretkey
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials/{credentialId}
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/{issuerId}/well-known-proxy
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/identity/actuator/health
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/publish
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/actuator/env
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/unlock
Domain: api-internal.released.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/internal/useridPwd
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/auth/invalid/token-login
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/auth/google/token-login
Domain: esignet-insurance.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/authenticate
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/logout
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/send-otp
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallet-binding
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v2/oauth-details
Domain: api-internal.released.mosip.net ---- Module: masterdata ---- End Point: v1/masterdata/idschema/latest
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/auth-code
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/actuator/health
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/new
Domain: api-internal.released.mosip.net ---- Module: idauthentication ---- End Point: idauthentication/v1/actuator/env
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=invalid
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=download
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/Mosip/configuration
Server Errors 
No server errors
Captcha Enabled
false
Mimoto Pre-requisite API Test ---- Report Date: 2025-08-18 ---- Tested Environment: qa-inji1 ---- Commit Id is: 9e64204d & Branch Name is:release-0.18.x
Test Scenario# Total# Passed# Skipped# Failed# Ignored# Known_IssuesExecution Time (HH:MM:SS)
Adding Identity44000000:01:39
GenerateVID60006000:00:01
CreateVID33000000:00:01
Mimoto API Test ---- Report Date: 2025-08-18 ---- Tested Environment: qa-inji1 ---- Commit Id is: 9e64204d & Branch Name is:release-0.18.x
Test Scenario# Total# Passed# Skipped# Failed# Ignored# Known_IssuesExecution Time (HH:MM:SS)
CreatePolicySunBirdR11000000:00:01
GetPolicySunBirdR11000000:00:01
SearchPolicySunBirdR11000000:00:01
OAuthDetailsRequest11000000:00:01
AuthenticateUser11000000:00:05
AuthorizationCode11000000:00:01
OAuthDetailsRequestSunBirdC11000000:00:01
AuthenticateUserSunBirdC11000000:00:01
AuthorizationCodeSunBirdC11000000:00:01
DownloadIssuerCredential66000000:00:10
AuthLock60006000:00:01
AuthUnLock40004000:00:01
RequestCredentials60006000:00:01
CredentialCheckStatus30003000:00:01
DownloadCredential20002000:00:01
SendOTP10001000:00:01
AidGetIndividualId50005000:00:01
BindingOtp3635000100:00:04
WalletBinding7877000100:03:17
GetAllIssuers33000000:00:01
GetIssuerWellKnown11000000:00:01
GoogleLoginToken55000000:00:01
GetUserProfile11000000:00:01
CreateWallet2221000100:00:02
UnlockWallet55000000:00:01
OAuthDetailsRequestForGoogleLogin22000000:00:01
AuthenticateUserForGoogleLogin22000000:00:23
AuthorizationCodeForGoogleLogin22000000:00:01
DownloadMosipIssuerCredentialWithGoogleLogin40280001200:00:03
OAuthDetailsRequestSunBirdCForGoogleLogin22000000:00:01
AuthenticateUserSunBirdCForGoogleLogin22000000:00:01
AuthorizationCodeSunBirdCForGoogleLogin22000000:00:01
DownloadIssuerCredentialWithGoogleLogin53000200:00:04
FetchAllCredentials76000100:00:01
ViewCredential1818000000:00:04
DeleteCredentials77000000:00:01
GetWallets33000000:00:01
DeleteWallet77000000:00:01
UnlockWalletAfterDelete11000000:00:01
Logout33000000:00:01
GetUserProfileAfterLogout11000000:00:01
ViewCredentialAfterLogout11000000:00:01
DeletePolicySunBirdR11000000:00:01
GetVerifierList11000000:00:01
GetIssuerConfiguration22000000:00:01
Total31526400331800:06:02
TestCase NumberTestCase DescriptionExecution Time (HH:MM:SS)
Adding Identity — Passed
TC_Mimoto_AddIdentity_02Creating a new identity with all valid parameters for Binding APIs00:00:01
TC_Mimoto_AddIdentity_03Creating a new identity for downloading issuer credential00:00:01
TC_Mimoto_AddIdentity_03Creating a new identity for downloading issuer credential00:00:01
TC_Mimoto_AddIdentity_01Creating a new identity with all valid parameters00:00:03
GenerateVID — Ignored
TC_Mimoto_GenerateVID_06Creating perpetual VID with binding valid request00:00:00
TC_Mimoto_GenerateVID_02Creating Perpetual VID with invalid OTP00:00:00
TC_Mimoto_GenerateVID_05Creating perpetual VID with invalid transactionID00:00:01
TC_Mimoto_GenerateVID_01Creating Perpetual VID with all valid parameters00:00:01
TC_Mimoto_GenerateVID_03Creating Perpetual VID with invalid UIN00:00:00
TC_Mimoto_GenerateVID_04Creating temporary VID with all valid request00:00:01
CreateVID — Passed
TC_Mimoto_GenerateVID_06Create perpetual VID for binding with valid details00:00:01
TC_Mimoto_GenerateVID_01Create perpetual VID with valid details00:00:01
TC_Mimoto_GenerateVID_04Create temporary VID with valid details00:00:01
CreatePolicySunBirdR — Passed
TC_Mimoto_CreatePolicySunBirdR_01Creating new sunbird policy with valid parameters00:00:01
GetPolicySunBirdR — Passed
TC_Mimoto_GetPolicySunBirdR_01Getting sunbird policy with valid parameters00:00:01
SearchPolicySunBirdR — Passed
TC_Mimoto_SearchPolicySunBirdR_01Searching sunbird policy with valid parameters00:00:01
OAuthDetailsRequest — Passed
TC_Mimoto_OAuthDetailsRequest_01Creating Oauth's details with all valid parameters00:00:01
AuthenticateUser — Passed
TC_Mimoto_AuthenticateUser_01Authenticate user to download credentials with all valid parameters00:00:05
AuthorizationCode — Passed
TC_Mimoto_AuthorizationCode_01Generate authorization code to download credential issuer00:00:01
OAuthDetailsRequestSunBirdC — Passed
TC_Mimoto_OAuthDetailsRequestSunBirdC_01Getting auth details for downloading sunbird credentials00:00:01
AuthenticateUserSunBirdC — Passed
TC_Mimoto_AuthenticateUserSunBirdC_01Authenticating user for downloading sunbird credential00:00:01
AuthorizationCodeSunBirdC — Passed
TC_Mimoto_AuthorizationCodeSunBirdC_01Generating authorization code for downloading sunbird VC00:00:01
DownloadIssuerCredential — Passed
TC_Mimoto_DownloadIssuerCredential_04Downloading credential with invalid credential AuthorizationCode00:00:01
TC_Mimoto_DownloadIssuerCredential_03Downloading credential with invalid credential00:00:01
TC_Mimoto_DownloadIssuerCredential_02Downloading credential with invalid issuer00:00:01
TC_Mimoto_DownloadIssuerCredential_01Downloading credential with all valid parameters00:00:05
TC_Mimoto_DownloadIssuerCredential_06Downloading sunbird credential with valid authorizationCode00:00:04
TC_Mimoto_DownloadIssuerCredential_05Downloading credential with invalid expired authorizationCode00:00:01
AuthLock — Ignored
TC_Mimoto_AuthLock_02Auth Lock a particular UIN with invalid OTP00:00:00
TC_Mimoto_AuthLock_01Auth lock a particular UIN with valid parameters00:00:00
TC_Mimoto_AuthLock_04Auth lock a particular VID with valid VID00:00:01
TC_Mimoto_AuthLock_06Auth lock a particular VID with invalid VID00:00:00
TC_Mimoto_AuthLock_03Auth Lock a particular UIN with valid OTP00:00:00
TC_Mimoto_AuthLock_05Auth lock a particular VID with invalid OTP00:00:00
AuthUnLock — Ignored
TC_Mimoto_AuthLock_10Unlock a particular VID with invalid OTP00:00:00
TC_Mimoto_AuthLock_07Auth unlock a particular UIN with valid parameters00:00:00
TC_Mimoto_AuthLock_08Auth unlock a particular VID with valid parameters00:00:00
TC_Mimoto_AuthLock_09Auth unlock a particular UIN with invalid OTP00:00:00
RequestCredentials — Ignored
TC_Mimoto_RequestCredentials_02requesting credential with valid VID00:00:00
TC_Mimoto_RequestCredentials_03requesting UIN credential with invalid OTP00:00:00
TC_Mimoto_RequestCredentials_04requesting credential with invalid transactionID00:00:00
TC_Mimoto_RequestCredentials_05requesting credential with invalid UIN00:00:00
TC_Mimoto_RequestCredentials_06requesting credential with invalid VID00:00:00
TC_Mimoto_RequestCredentials_01requesting credential with all valid parameters00:00:00
CredentialCheckStatus — Ignored
TC_Mimoto_CredentialsStatus_01Retrieving credential status with valid UIN00:00:01
TC_Mimoto_CreateVID_03Retrieving credential status with invalid requestId00:00:00
TC_Mimoto_CredentialsStatus_02Retrieving credential status with valid VID00:00:00
DownloadCredential — Ignored
TC_Mimoto_DownloadCredential_01Checking credential status with all valid parameters00:00:00
TC_Mimoto_DownloadCredential_02Checking credential status with invalid StatusCode00:00:00
SendOTP — Ignored
TC_Mimoto_individualOTP_01generating individual OTP with valid parameters00:00:01
AidGetIndividualId — Ignored
TC_Mimoto_AidGetIndividualId_02Generating individualID with invalid AID00:00:00
TC_Mimoto_AidGetIndividualId_03Generating individualID with Invalid OTP00:00:00
TC_Mimoto_AidGetIndividualId_05Generating individualID with invalid lengh of AID00:00:01
TC_Mimoto_AidGetIndividualId_04Generating individualID with valid OTP00:00:01
TC_Mimoto_AidGetIndividualId_01Generating AID status with valid AID00:00:01
BindingOtp — known_issues
TC_Mimoto_BindingOtp_02Creating OTP for binding a individualID with valid VID00:00:01
BindingOtp — Passed
TC_Mimoto_BindingOtp_13Creating OTP for binding a individualID with OTP channel being empty00:00:01
TC_Mimoto_BindingOtp_10Creating OTP for binding a individualID with OTP channel being empty00:00:01
TC_Mimoto_BindingOtp_19Creating OTP for binding a individualID with empty request time00:00:01
TC_Mimoto_BindingOtp_05Creating OTP for binding a individualID with individualId missing00:00:01
TC_Mimoto_BindingOtp_17Creating OTP for binding a individualID with future request time00:00:01
TC_Mimoto_BindingOtp_08Creating OTP for binding a individualID with invalid OTP channel00:00:01
TC_Mimoto_AuthLock_07Creating OTP for binding a individualID with invalid request time00:00:01
TC_Mimoto_BindingOtp_03Creating OTP for binding a individualID with invalid UIN00:00:01
TC_Mimoto_BindingOtp_12Creating OTP for binding a individualID with OTP channel missing00:00:01
TC_Mimoto_BindingOtp_09Creating OTP for binding a individualID with OTP channel missing00:00:01
TC_Mimoto_BindingOtp_18Creating OTP for binding a individualID with missing request time00:00:01
TC_Mimoto_BindingOtp_04Creating OTP for binding a individualID without individualId attribute00:00:01
TC_Mimoto_BindingOtp_14Creating OTP for binding a individualID with OTP channel being empty00:00:01
TC_Mimoto_BindingOtp_11Creating OTP for binding a individualID with OTP channel value being null00:00:01
TC_Mimoto_BindingOtp_06Creating OTP for binding a individualID with individualId value as null00:00:01
TC_Mimoto_BindingOtp_16Creating OTP for binding a individualID with past request time00:00:01
TC_Mimoto_BindingOtp_07Creating OTP for binding a individualID with OTP channel value been spaced in between00:00:01
TC_Mimoto_BindingOtp_01Creating OTP for binding a individualID with valid UIN00:00:01
TC_Mimoto_BindingOtp_30Creating OTP for binding a VID with OTP channel values empty00:00:01
TC_Mimoto_BindingOtp_27Creating OTP for binding a VID with empty OTP channel values00:00:01
TC_Mimoto_BindingOtp_36Creating OTP for binding a VID with request time empty00:00:01
TC_Mimoto_BindingOtp_22Creating OTP for binding a individualID with empty VID00:00:01
TC_Mimoto_BindingOtp_34Creating OTP for binding a VID with future request time00:00:01
TC_Mimoto_BindingOtp_25Creating OTP for binding a VID with invalid OTP channel00:00:01
TC_Mimoto_BindingOtp_32Creating OTP for binding a VID with invalid request time00:00:01
TC_Mimoto_BindingOtp_20Creating OTP for binding a individualID with invalid VID00:00:01
TC_Mimoto_BindingOtp_29Creating OTP for binding a VID with OTP channel values missing00:00:01
TC_Mimoto_BindingOtp_26Creating OTP for binding a VID with missing OTP channel values00:00:01
TC_Mimoto_BindingOtp_35Creating OTP for binding a VID with request time missing00:00:01
TC_Mimoto_BindingOtp_21Creating OTP for binding a individualID with missing VID00:00:01
TC_Mimoto_BindingOtp_31Creating OTP for binding a VID with OTP channel values as null00:00:01
TC_Mimoto_BindingOtp_28Creating OTP for binding a VID with OTP channel values as null00:00:01
TC_Mimoto_BindingOtp_23Creating OTP for binding a individualID with invalid VID00:00:01
TC_Mimoto_BindingOtp_33Creating OTP for binding a VID with past request time00:00:01
TC_Mimoto_BindingOtp_24Creating OTP for binding a VID with OTP channel value been spaced in between00:00:01
WalletBinding — known_issues
TC_Mimoto_WalletBinding_02Generating OTP to bind VC with valid VID00:00:00
WalletBinding — Passed
TC_Mimoto_WalletBinding_14Generating OTP to bind VC with empty authfactortype00:00:01
TC_Mimoto_WalletBinding_20Generating OTP to bind VC with empty challenge00:00:01
TC_Mimoto_WalletBinding_25Generating OTP to bind VC with empty formate00:00:02
TC_Mimoto_WalletBinding_09Generating OTP to bind VC with empty individualId00:00:01
TC_Mimoto_WalletBinding_06Generating OTP to bind VC with empty requestime00:00:03
TC_Mimoto_WalletBinding_30Generating OTP to bind VC with empty authFactorType100:00:01
TC_Mimoto_WalletBinding_35Generating OTP to bind VC with empty format100:00:01
TC_Mimoto_WalletBinding_05Generating OTP to bind VC with future request time00:00:02
TC_Mimoto_WalletBinding_13Generating OTP to bind VC with invalid authfactortype00:00:02
TC_Mimoto_WalletBinding_18Generating OTP to bind VC with invalid challenge00:00:02
TC_Mimoto_WalletBinding_23Generating OTP to bind VC with invalid formate00:00:01
TC_Mimoto_WalletBinding_08Generating OTP to bind VC with invalid individualId00:00:01
TC_Mimoto_WalletBinding_03Generating OTP to bind VC with invalid request time00:00:02
TC_Mimoto_WalletBinding_28Generating OTP to bind VC with invalid authFactorType100:00:02
TC_Mimoto_WalletBinding_33Generating OTP to bind VC with invalid format100:00:01
TC_Mimoto_WalletBinding_38Generating OTP to bind VC with invalid publickey00:00:11
TC_Mimoto_WalletBinding_15Generating OTP to bind VC with missing authfactortype00:00:02
TC_Mimoto_WalletBinding_19Generating OTP to bind VC with missing challenge00:00:01
TC_Mimoto_WalletBinding_24Generating OTP to bind VC with missing formate00:00:01
TC_Mimoto_WalletBinding_11Generating OTP to bind VC with individualId being missing00:00:02
TC_Mimoto_WalletBinding_07Generating OTP to bind VC with missing requestime00:00:02
TC_Mimoto_WalletBinding_29Generating OTP to bind VC with missing authFactorType100:00:02
TC_Mimoto_WalletBinding_34Generating OTP to bind VC with missing format100:00:01
TC_Mimoto_WalletBinding_40Generating OTP to bind VC with missing publickey00:00:11
TC_Mimoto_WalletBinding_17Generating OTP to bind VC with authfactortype value being just null00:00:01
TC_Mimoto_WalletBinding_22Generating OTP to bind VC with challenge value having null00:00:01
TC_Mimoto_WalletBinding_27Generating OTP to bind VC with formate value having null00:00:01
TC_Mimoto_WalletBinding_10Generating OTP to bind VC with individualId being null00:00:02
TC_Mimoto_WalletBinding_32Generating OTP to bind VC with authFactorType1 value having null00:00:02
TC_Mimoto_WalletBinding_37Generating OTP to bind VC with format1 value having null00:00:01
TC_Mimoto_WalletBinding_39Generating OTP to bind VC with null as publickey00:00:11
TC_Mimoto_WalletBinding_01Generating OTP to bind VC with valid UIN00:00:03
TC_Mimoto_WalletBinding_04Generating OTP to bind VC with past request time00:00:02
TC_Mimoto_WalletBinding_16Generating OTP to bind VC with authfactortype value being just space00:00:02
TC_Mimoto_WalletBinding_21Generating OTP to bind VC with challenge value having space00:00:01
TC_Mimoto_WalletBinding_26Generating OTP to bind VC with formate value having space00:00:02
TC_Mimoto_WalletBinding_12Generating OTP to bind VC with individualId value having space00:00:01
TC_Mimoto_WalletBinding_31Generating OTP to bind VC with authFactorType1 value having space00:00:02
TC_Mimoto_WalletBinding_36Generating OTP to bind VC with format1 value having space00:00:01
TC_Mimoto_WalletBinding_52Generating OTP to bind VID VC with empty authfactortype00:00:02
TC_Mimoto_WalletBinding_58Generating OTP to bind VID VC with empty challenge00:00:01
TC_Mimoto_WalletBinding_63Generating OTP to bind VID VC with empty formate00:00:01
TC_Mimoto_WalletBinding_47Generating OTP to bind vid VC with empty individualId00:00:01
TC_Mimoto_WalletBinding_44Generating OTP to bind vid VC with empty request time00:00:02
TC_Mimoto_WalletBinding_68Generating OTP to bind VID VC with empty authFactorType100:00:01
TC_Mimoto_WalletBinding_73Generating OTP to bind VID VC with empty format100:00:01
TC_Mimoto_WalletBinding_43Generating OTP to bind vid VC with future request time00:00:01
TC_Mimoto_WalletBinding_51Generating OTP to bind VID VC with invalid authfactortype00:00:01
TC_Mimoto_WalletBinding_56Generating OTP to bind VID VC with invalid challenge00:00:01
TC_Mimoto_WalletBinding_61Generating OTP to bind VID VC with invalid formate00:00:01
TC_Mimoto_WalletBinding_46Generating OTP to bind vid VC with invalid individualId00:00:01
TC_Mimoto_WalletBinding_41Generating OTP to bind vid VC with invalid request time00:00:01
TC_Mimoto_WalletBinding_66Generating OTP to bind VID VC with invalid authFactorType100:00:01
TC_Mimoto_WalletBinding_71Generating OTP to bind VID VC with invalid format100:00:01
TC_Mimoto_WalletBinding_76Generating OTP to bind VID VC with invalid publickey00:00:11
TC_Mimoto_WalletBinding_53Generating OTP to bind VID VC with missing authfactortype00:00:02
TC_Mimoto_WalletBinding_57Generating OTP to bind VID VC with missing challenge00:00:01
TC_Mimoto_WalletBinding_62Generating OTP to bind VID VC with missing formate00:00:01
TC_Mimoto_WalletBinding_49Generating OTP to bind vid VC with missing individualId00:00:02
TC_Mimoto_WalletBinding_45Generating OTP to bind vid VC with missing request time00:00:01
TC_Mimoto_WalletBinding_67Generating OTP to bind VID VC with missing authFactorType100:00:01
TC_Mimoto_WalletBinding_72Generating OTP to bind VID VC with missing format100:00:01
TC_Mimoto_WalletBinding_78Generating OTP to bind VID VC with missing publickey00:00:12
TC_Mimoto_WalletBinding_55Generating OTP to bind VID VC with authfactortype value being just null00:00:01
TC_Mimoto_WalletBinding_60Generating OTP to bind VID VC with challenge value having null00:00:01
TC_Mimoto_WalletBinding_65Generating OTP to bind VID VC with formate value having null00:00:01
TC_Mimoto_WalletBinding_48Generating OTP to bind vid VC with null individualId00:00:02
TC_Mimoto_WalletBinding_70Generating OTP to bind VID VC with authFactorType1 value having null00:00:01
TC_Mimoto_WalletBinding_75Generating OTP to bind VID VC with format1 value having null00:00:01
TC_Mimoto_WalletBinding_77Generating OTP to bind VID VC with null as publickey00:00:11
TC_Mimoto_WalletBinding_42Generating OTP to bind vid VC with past request time00:00:02
TC_Mimoto_WalletBinding_54Generating OTP to bind VID VC with authfactortype value being just space00:00:01
TC_Mimoto_WalletBinding_59Generating OTP to bind VID VC with challenge value having space00:00:01
TC_Mimoto_WalletBinding_64Generating OTP to bind VID VC with formate value having space00:00:01
TC_Mimoto_WalletBinding_50Generating OTP to bind VID VC with individualId value having space00:00:01
TC_Mimoto_WalletBinding_69Generating OTP to bind VID VC with authFactorType1 value having space00:00:02
TC_Mimoto_WalletBinding_74Generating OTP to bind VID VC with format1 value having space00:00:01
GetAllIssuers — Passed
TC_Mimoto_GetAllIssuers_01Retrieving issuers with all valid parameters00:00:01
TC_Mimoto_GetAllIssuers_03Retrieving invalid issuer00:00:01
TC_Mimoto_GetAllIssuers_02Retrieving all specific issuer with all valid parameters00:00:01
GetIssuerWellKnown — Passed
Mimoto_GetIssuerWellKnown_All_Valid_SmokeGenerating the issuer well known with all valid parameters00:00:01
GoogleLoginToken — Passed
TC_Mimoto_GoogleLoginToken_05Creating the sesion token for google login with expired token and expects it to fail00:00:01
TC_Mimoto_GoogleLoginToken_04Creating the sesion token for google login with expired token and expects it to fail00:00:01
TC_Mimoto_GoogleLoginToken_03Creating the sesion token for google login with invalid IDT token and expects it to fail00:00:01
TC_Mimoto_GoogleLoginToken_02Creating the sesion token for google login with invalid provider00:00:01
TC_Mimoto_GoogleLoginToken_01Creating the sesion token for google login00:00:01
GetUserProfile — Passed
TC_Mimoto_GetUserProfile_01Get the user profile details for the session login00:00:01
CreateWallet — known_issues
TC_Mimoto_CreateWallet_08Creating new wallet with space in wallet name and expects to fail00:00:01
CreateWallet — Passed
TC_Mimoto_CreateWallet_07Creating new wallet with empty wallet name and expects to fail00:00:01
TC_Mimoto_CreateWallet_15Creating new wallet with empty wallet pin and expects to fail00:00:01
TC_Mimoto_CreateWallet_06Creating new wallet with invalid wallet name and expects to fail00:00:01
TC_Mimoto_CreateWallet_09Creating new wallet with missing wallet name00:00:01
TC_Mimoto_CreateWallet_17Creating new wallet with missing wallet pin and expects to fail00:00:01
TC_Mimoto_CreateWallet_10Creating new wallet with more than 50 characters in wallet name and expects to fail00:00:01
TC_Mimoto_CreateWallet_14Creating new wallet with wallet pin with more than 6 digits and expects to fail00:00:01
TC_Mimoto_CreateWallet_03Creating new wallet for the same user with same name with successful login00:00:01
TC_Mimoto_CreateWallet_05Creating new wallet with expired session and expects to fail00:00:01
TC_Mimoto_CreateWallet_16Creating new wallet with space in wallet pin and expects to fail00:00:01
TC_Mimoto_CreateWallet_20Creating new wallet with special characters in wallet pin and expects to fail00:00:01
TC_Mimoto_CreateWallet_19Creating new wallet with string value in wallet pin and expects to fail00:00:01
TC_Mimoto_CreateWallet_13Creating new wallet with numbers as wallet name00:00:01
TC_Mimoto_CreateWallet_12Creating new wallet with special characters as wallet name and expects to fail00:00:01
TC_Mimoto_CreateWallet_11Creating new wallet with wallet name contains spaces00:00:01
TC_Mimoto_CreateWallet_21Creating new wallet with wallet pin and confirm wallet pin mismatch and expects to fail00:00:01
TC_Mimoto_CreateWallet_04Creating new wallet without login and expects to fail00:00:01
TC_Mimoto_CreateWallet_02Creating new wallet for the same user with successful login00:00:01
TC_Mimoto_CreateWallet_22Creating new wallet without wallet pin and wallet name and expects to fail00:00:01
TC_Mimoto_CreateWallet_01Creating new wallet with successful login00:00:01
TC_Mimoto_CreateWallet_18Creating new wallet with invalid wallet pin and expects to fail00:00:01
UnlockWallet — Passed
TC_Mimoto_UnlockWallet_03Unlock the wallet with incorrect wallet Pin and expects it to fail00:00:01
TC_Mimoto_UnlockWallet_02Unlock the wallet with invalid wallet id and expects it to fail00:00:01
TC_Mimoto_UnlockWallet_06Unlock the wallet with invalid wallet Pin and expects it to fail00:00:01
TC_Mimoto_UnlockWallet_04Unlock the wallet without login session and expects it to fail00:00:01
TC_Mimoto_UnlockWallet_01Unlock the wallet that is created00:00:01
OAuthDetailsRequestForGoogleLogin — Passed
TC_Mimoto_OAuthDetailsRequestForGoogleLogin_01Creating Oauth's details with all valid parameters00:00:01
TC_Mimoto_OAuthDetailsRequestForGoogleLogin_02Creating Oauth's details with all valid parameters for Neg scenario00:00:01
AuthenticateUserForGoogleLogin — Passed
TC_Mimoto_AuthenticateUserForGoogleLogin_02Authenticate user to download credentials with all valid parameters for neg scenario00:00:11
TC_Mimoto_AuthenticateUserForGoogleLogin_01Authenticate user to download credentials with all valid parameters00:00:11
AuthorizationCodeForGoogleLogin — Passed
TC_Mimoto_AuthorizationCodeForGoogleLogin_01Generate authorization code to download credential issuer00:00:01
TC_Mimoto_AuthorizationCodeForGoogleLogin_02Generate authorization code to download credential issuer for Neg scenario00:00:01
DownloadMosipIssuerCredentialWithGoogleLogin — known_issues
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_22Downloading credential with invalid code verifier along with google login and expects to fail00:00:00
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_12Downloading credential with invalid code along with google login and expects to fail00:00:00
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_32Downloading credential with invalid credential along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_07Downloading credential with invalid grant type along with google login and expects to fail00:00:00
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_27Downloading credential with invalid issuer along with google login and expects to fail00:00:00
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_17Downloading credential with invalid redirect uri along with google login and expects to fail00:00:00
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_11Downloading credential with numeric grant type along with google login and expects to fail00:00:00
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_26Downloading credential with numeric in code verifier along with google login and expects to fail00:00:00
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_16Downloading credential with numeric in code along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_36Downloading credential with numeric in credential along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_31Downloading credential with numeric in issuer along with google login and expects to fail00:00:00
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_21Downloading credential with numeric in redirect uri along with google login and expects to fail00:00:01
DownloadMosipIssuerCredentialWithGoogleLogin — Passed
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_01Downloading credential with all valid parameters along with google login00:00:02
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_02Downloading same credential with all valid parameters along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_23Downloading credential with empty code verifier along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_13Downloading credential with empty code along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_33Downloading credential with empty credential along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_08Downloading credential with empty grant type along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_28Downloading credential with empty issuer along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_18Downloading credential with empty redirect uri along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_37Downloading credential with empty request body with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_03Downloading credential with invalid wallet id along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_25Downloading credential with missing code verifier along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_15Downloading credential with missing code along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_35Downloading credential with missing credential along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_10Downloading credential with missing grant type along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_30Downloading credential with missing issuer along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_20Downloading credential with missing redirect uri along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_05Downloading credential with null value in wallet id along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_06Downloading credential with numeric value in wallet id along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_24Downloading credential with space in code verifier along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_14Downloading credential with space in code along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_34Downloading credential with space in credential along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_09Downloading credential with space in grant type along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_29Downloading credential with space in issuer along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_19Downloading credential with space in redirect uri along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_04Downloading credential with sapce value in wallet id along with google login and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_40Downloading credential with expired google login session and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_38Downloading credential with all valid parameters along with google login when a different session is active and expects to fail00:00:01
TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_39Downloading credential without google login and expects to fail00:00:01
OAuthDetailsRequestSunBirdCForGoogleLogin — Passed
TC_Mimoto_OAuthDetailsRequestSunBirdCForGoogleLogin_02Getting auth details for downloading multiple sunbird credentials with google login00:00:01
TC_Mimoto_OAuthDetailsRequestSunBirdCForGoogleLogin_01Getting auth details for downloading sunbird credentials with google login00:00:01
AuthenticateUserSunBirdCForGoogleLogin — Passed
TC_Mimoto_AuthenticateUserSunBirdCForGoogleLogin_02Authenticating user for downloading stayprotected credential with google login00:00:01
TC_Mimoto_AuthenticateUserSunBirdCForGoogleLogin_01Authenticating user for downloading stayprotected credential with google login00:00:01
AuthorizationCodeSunBirdCForGoogleLogin — Passed
TC_Mimoto_AuthorizationCodeSunBirdC_02Generating authorization code for downloading multiple sunbird VC with google login00:00:01
TC_Mimoto_AuthorizationCodeSunBirdC_01Generating authorization code for downloading sunbird VC with google login00:00:01
DownloadIssuerCredentialWithGoogleLogin — known_issues
TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_03Downloading sunbird credential with valid authorizationCode after google login with invalid locale and expects it to fail00:00:01
TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_04Downloading sunbird credential with valid authorizationCode after google login with space in locale and expects it to fail00:00:00
DownloadIssuerCredentialWithGoogleLogin — Passed
TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_02Downloading Multiple sunbird credential for policy already downloaded with valid authorizationCode after google login00:00:01
TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_01Downloading sunbird credential with valid authorizationCode after google login00:00:02
TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_05Downloading sunbird credential with valid authorizationCode after google login with numeric in locale and expects it to fail00:00:01
FetchAllCredentials — known_issues
TC_Mimoto_FetchAllCredentials_03Get list of all credentials with empty wallet id and expects it to fail00:00:00
FetchAllCredentials — Passed
TC_Mimoto_FetchAllCredentials_07Get list of all credentials with expired session and expects it to fail00:00:01
TC_Mimoto_FetchAllCredentials_05Get list of all credentials with invalid session and expects it to fail00:00:01
TC_Mimoto_FetchAllCredentials_02Get list of all credentials with invalid wallet id and expects it to fail00:00:01
TC_Mimoto_FetchAllCredentials_04Get list of all credentials with space wallet id and expects it to fail00:00:01
TC_Mimoto_FetchAllCredentials_06Get list of all credentials without unlocking wallet and expects it to fail00:00:01
TC_Mimoto_FetchAllCredentials_01Get list of all credentials saved for the wallet00:00:01
ViewCredential — Passed
TC_Mimoto_ViewCredential_03Download the credential saved for the wallet with credential ID00:00:01
TC_Mimoto_ViewCredential_04View the credential saved for the wallet with credential ID when action query is empty00:00:01
TC_Mimoto_ViewCredential_08View the credential saved for the wallet with empty credential ID and expects it to fail00:00:01
TC_Mimoto_ViewCredential_11View the credential saved for the wallet with empty wallet ID and expects it to fail00:00:01
TC_Mimoto_ViewCredential_06View the credential saved for the wallet with credential ID when action query as invalid00:00:01
TC_Mimoto_ViewCredential_14View the credential saved for the wallet with invalid accept header and expects it to fail00:00:01
TC_Mimoto_ViewCredential_13View the credential saved for the wallet with invalid accept language and expects it to fail00:00:01
TC_Mimoto_ViewCredential_07View the credential saved for the wallet with invalid credential ID and expects it to fail00:00:01
TC_Mimoto_ViewCredential_10View the credential saved for the wallet with invalid wallet ID and expects it to fail00:00:01
TC_Mimoto_ViewCredential_02View the another credential saved for the wallet with credential ID00:00:01
TC_Mimoto_ViewCredential_16View the credential saved for the wallet space in accept header and expects it to fail00:00:01
TC_Mimoto_ViewCredential_14View the credential saved for the wallet with space in accept language and expects it to fail00:00:01
TC_Mimoto_ViewCredential_09View the credential saved for the wallet with space in credential ID and expects it to fail00:00:01
TC_Mimoto_ViewCredential_12View the credential saved for the wallet with space in wallet ID and expects it to fail00:00:01
TC_Mimoto_ViewCredential_05View the credential saved for the wallet with credential ID when action query has only space00:00:01
TC_Mimoto_ViewCredential_17View the credential saved for the wallet with expired token and expects it to fail00:00:01
TC_Mimoto_ViewCredential_15View the credential saved for the wallet without accept header and expects it to fail00:00:01
TC_Mimoto_ViewCredential_01View the credential saved for the wallet with credential ID00:00:01
DeleteCredentials — Passed
TC_Mimoto_DeleteCredentials_05Delete the credential empty or space in credential id and expects it to fail00:00:01
TC_Mimoto_DeleteCredentials_03Delete the credential invalid credential id for the wallet and expects it to fail00:00:01
TC_Mimoto_DeleteCredentials_04Delete the credential invalid wallet id for the wallet and expects it to fail00:00:01
TC_Mimoto_DeleteCredentials_06Delete the credential for the wallet with multiple credentials created00:00:01
TC_Mimoto_DeleteCredentials_08Delete the credential for the wallet without login and expects it to fail00:00:01
TC_Mimoto_DeleteCredentials_02Delete the credential that is already deleted for the wallet and expects it to fail00:00:01
TC_Mimoto_DeleteCredentials_01Delete the credential that is saved for the wallet00:00:01
GetWallets — Passed
TC_Mimoto_GetWallets_03Get list of all the wallets that is present in DB with expired login and expects to fail00:00:01
TC_Mimoto_GetWallets_02Get list of all the wallets that is present in DB without login and expects to fail00:00:01
TC_Mimoto_GetWallets_01Get list of all the wallets that is present in DB00:00:01
DeleteWallet — Passed
TC_Mimoto_DeleteWallet_02Delete the wallet that is already deleted and expects it to fail00:00:01
TC_Mimoto_DeleteWallet_04Delete the wallet with empty wallet id and expects it to fail00:00:01
TC_Mimoto_DeleteWallet_07Delete the wallet with expired login session and expects it to fail00:00:01
TC_Mimoto_DeleteWallet_03Delete the wallet with invalid wallet id and expects it to fail00:00:01
TC_Mimoto_DeleteWallet_05Delete the wallet with space wallet id and expects it to fail00:00:01
TC_Mimoto_DeleteWallet_06Delete the wallet without login session and expects it to fail00:00:01
TC_Mimoto_DeleteWallet_01Delete the wallet that is created00:00:01
UnlockWalletAfterDelete — Passed
TC_Mimoto_UnlockWalletAfterDelete_01Unlock the wallet that is already deleted and expects it to fail00:00:01
Logout — Passed
TC_Mimoto_Logout_03Logout the session with expired login session and expects it to fail00:00:01
TC_Mimoto_Logout_02Logout the session without creating the login session and providing random cookie value and expects it to fail00:00:01
TC_Mimoto_Logout_01Logout the session that is created00:00:01
GetUserProfileAfterLogout — Passed
TC_Mimoto_GetUserProfileAfterLogout_01Get the user profile details for the session login00:00:01
ViewCredentialAfterLogout — Passed
TC_Mimoto_ViewCredential_18View the credential saved for the wallet after logout and expects it to fail00:00:01
DeletePolicySunBirdR — Passed
TC_Mimoto_DeletePolicySunBirdR_01Deleting Sunbird policy with valid parameters00:00:01
GetVerifierList — Passed
TC_Mimoto_GetVerifierList_01Retrieving verifiers list with all valid parameters00:00:01
GetIssuerConfiguration — Passed
TC_Mimoto_GetIssuerConfiguration_01Retrieving verifiers list with all valid parameters00:00:01
TC_Mimoto_GetIssuerConfiguration_02Retrieving verifiers list with invalid URL00:00:01

io.mosip.testrig.apirig.mimoto.testscripts.AddIdentity#Mimoto_AddIdentity_Binding_smoke_Pos

Testcase Input
testCaseName=Mimoto_AddIdentity_Binding_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "Mimoto_AddIdentity_Binding_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","documents":[{"category":"{{category}}","value":"{{value}}"}],"identity":{"gender":[{"language":"eng","value":"MLE"},{"language":"ara","value":"MLE"},{"language":"fra","value":"MLE"},{"language":"kan","value":"MLE"},{"language":"hin","value":"MLE"},{"language":"tam","value":"MLE"}],"city":[{"language":"eng","value":"TEST_CITYeng"},{"language":"ara","value":"TEST_CITYara"},{"language":"fra","value":"TEST_CITYfra"},{"language":"kan","value":"TEST_CITYkan"},{"language":"hin","value":"TEST_CITYhin"},{"language":"tam","value":"TEST_CITYtam"}],"postalCode":"{{postalCode}}","fullName":[{"language":"eng","value":"TEST_FULLNAMEeng"},{"language":"ara","value":"TEST_FULLNAMEara"},{"language":"fra","value":"TEST_FULLNAMEfra"},{"language":"kan","value":"TEST_FULLNAMEkan"},{"language":"hin","value":"TEST_FULLNAMEhin"},{"language":"tam","value":"TEST_FULLNAMEtam"}],"dateOfBirth":"{{dateOfBirth}}","proofOfIdentity":{"format":"txt","type":"DOC001","value":"fileReferenceID"},"individualBiometrics":{"format":"cbeff","version":1,"value":"fileReferenceID"},"IDSchemaVersion":0.4,"province":[{"language":"eng","value":"TEST_PROVINCEeng"},{"language":"ara","value":"TEST_PROVINCEara"},{"language":"fra","value":"TEST_PROVINCEfra"},{"language":"kan","value":"TEST_PROVINCEkan"},{"language":"hin","value":"TEST_PROVINCEhin"},{"language":"tam","value":"TEST_PROVINCEtam"}],"zone":[{"language":"eng","value":"TEST_ZONEeng"},{"language":"ara","value":"TEST_ZONEara"},{"language":"fra","value":"TEST_ZONEfra"},{"language":"kan","value":"TEST_ZONEkan"},{"language":"hin","value":"TEST_ZONEhin"},{"language":"tam","value":"TEST_ZONEtam"}],"phone":"$PHONENUMBERFORIDENTITY$","addressLine1":[{"language":"eng","value":"TEST_ADDRESSLINE1eng"},{"language":"ara","value":"TEST_ADDRESSLINE1ara"},{"language":"fra","value":"TEST_ADDRESSLINE1fra"},{"language":"kan","value":"TEST_ADDRESSLINE1kan"},{"language":"hin","value":"TEST_ADDRESSLINE1hin"},{"language":"tam","value":"TEST_ADDRESSLINE1tam"}],"addressLine2":[{"language":"eng","value":"TEST_ADDRESSLINE2eng"},{"language":"ara","value":"TEST_ADDRESSLINE2ara"},{"language":"fra","value":"TEST_ADDRESSLINE2fra"},{"language":"kan","value":"TEST_ADDRESSLINE2kan"},{"language":"hin","value":"TEST_ADDRESSLINE2hin"},{"language":"tam","value":"TEST_ADDRESSLINE2tam"}],"UIN":"{{UIN}}","addressLine3":[{"language":"eng","value":"TEST_ADDRESSLINE3eng"},{"language":"ara","value":"TEST_ADDRESSLINE3ara"},{"language":"fra","value":"TEST_ADDRESSLINE3fra"},{"language":"kan","value":"TEST_ADDRESSLINE3kan"},{"language":"hin","value":"TEST_ADDRESSLINE3hin"},{"language":"tam","value":"TEST_ADDRESSLINE3tam"}],"region":[{"language":"eng","value":"TEST_REGIONeng"},{"language":"ara","value":"TEST_REGIONara"},{"language":"fra","value":"TEST_REGIONfra"},{"language":"kan","value":"TEST_REGIONkan"},{"language":"hin","value":"TEST_REGIONhin"},{"language":"tam","value":"TEST_REGIONtam"}],"email":"$EMAILVALUE$"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=mimoto/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a new identity with all valid parameters for Binding APIs, uniqueIdentifier=TC_Mimoto_AddIdentity_02
Messages
Request: (End Point URL: https://api-internal.released.mosip.net/idrepository/v1/identity/)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
response.status ACTIVATED ACTIVATED PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.AddIdentity#Mimoto_AddIdentity_downloadIssuerCredentialWithGoogleLogin_smoke_Pos

Testcase Input
testCaseName=Mimoto_AddIdentity_downloadIssuerCredentialWithGoogleLogin_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "Mimoto_AddIdentity_downloadIssuerCredentialWithGoogleLogin_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","documents":[{"category":"{{category}}","value":"{{value}}"}],"identity":{"gender":[{"language":"eng","value":"MLE"},{"language":"ara","value":"MLE"},{"language":"fra","value":"MLE"},{"language":"kan","value":"MLE"},{"language":"hin","value":"MLE"},{"language":"tam","value":"MLE"}],"city":[{"language":"eng","value":"TEST_CITYeng"},{"language":"ara","value":"TEST_CITYara"},{"language":"fra","value":"TEST_CITYfra"},{"language":"kan","value":"TEST_CITYkan"},{"language":"hin","value":"TEST_CITYhin"},{"language":"tam","value":"TEST_CITYtam"}],"postalCode":"{{postalCode}}","fullName":[{"language":"eng","value":"TEST_FULLNAMEeng"},{"language":"ara","value":"TEST_FULLNAMEara"},{"language":"fra","value":"TEST_FULLNAMEfra"},{"language":"kan","value":"TEST_FULLNAMEkan"},{"language":"hin","value":"TEST_FULLNAMEhin"},{"language":"tam","value":"TEST_FULLNAMEtam"}],"dateOfBirth":"{{dateOfBirth}}","proofOfIdentity":{"format":"txt","type":"DOC001","value":"fileReferenceID"},"individualBiometrics":{"format":"cbeff","version":1,"value":"fileReferenceID"},"IDSchemaVersion":0.4,"province":[{"language":"eng","value":"TEST_PROVINCEeng"},{"language":"ara","value":"TEST_PROVINCEara"},{"language":"fra","value":"TEST_PROVINCEfra"},{"language":"kan","value":"TEST_PROVINCEkan"},{"language":"hin","value":"TEST_PROVINCEhin"},{"language":"tam","value":"TEST_PROVINCEtam"}],"zone":[{"language":"eng","value":"TEST_ZONEeng"},{"language":"ara","value":"TEST_ZONEara"},{"language":"fra","value":"TEST_ZONEfra"},{"language":"kan","value":"TEST_ZONEkan"},{"language":"hin","value":"TEST_ZONEhin"},{"language":"tam","value":"TEST_ZONEtam"}],"phone":"$PHONENUMBERFORIDENTITY$","addressLine1":[{"language":"eng","value":"TEST_ADDRESSLINE1eng"},{"language":"ara","value":"TEST_ADDRESSLINE1ara"},{"language":"fra","value":"TEST_ADDRESSLINE1fra"},{"language":"kan","value":"TEST_ADDRESSLINE1kan"},{"language":"hin","value":"TEST_ADDRESSLINE1hin"},{"language":"tam","value":"TEST_ADDRESSLINE1tam"}],"addressLine2":[{"language":"eng","value":"TEST_ADDRESSLINE2eng"},{"language":"ara","value":"TEST_ADDRESSLINE2ara"},{"language":"fra","value":"TEST_ADDRESSLINE2fra"},{"language":"kan","value":"TEST_ADDRESSLINE2kan"},{"language":"hin","value":"TEST_ADDRESSLINE2hin"},{"language":"tam","value":"TEST_ADDRESSLINE2tam"}],"UIN":"{{UIN}}","addressLine3":[{"language":"eng","value":"TEST_ADDRESSLINE3eng"},{"language":"ara","value":"TEST_ADDRESSLINE3ara"},{"language":"fra","value":"TEST_ADDRESSLINE3fra"},{"language":"kan","value":"TEST_ADDRESSLINE3kan"},{"language":"hin","value":"TEST_ADDRESSLINE3hin"},{"language":"tam","value":"TEST_ADDRESSLINE3tam"}],"region":[{"language":"eng","value":"TEST_REGIONeng"},{"language":"ara","value":"TEST_REGIONara"},{"language":"fra","value":"TEST_REGIONfra"},{"language":"kan","value":"TEST_REGIONkan"},{"language":"hin","value":"TEST_REGIONhin"},{"language":"tam","value":"TEST_REGIONtam"}],"email":"$EMAILVALUE$"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=mimoto/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a new identity for downloading issuer credential, uniqueIdentifier=TC_Mimoto_AddIdentity_03
Messages
Request: (End Point URL: https://api-internal.released.mosip.net/idrepository/v1/identity/)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
response.status ACTIVATED ACTIVATED PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.AddIdentity#Mimoto_AddIdentity_downloadIssuerCredential_smoke_Pos

Testcase Input
testCaseName=Mimoto_AddIdentity_downloadIssuerCredential_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "Mimoto_AddIdentity_downloadIssuerCredential_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","documents":[{"category":"{{category}}","value":"{{value}}"}],"identity":{"gender":[{"language":"eng","value":"MLE"},{"language":"ara","value":"MLE"},{"language":"fra","value":"MLE"},{"language":"kan","value":"MLE"},{"language":"hin","value":"MLE"},{"language":"tam","value":"MLE"}],"city":[{"language":"eng","value":"TEST_CITYeng"},{"language":"ara","value":"TEST_CITYara"},{"language":"fra","value":"TEST_CITYfra"},{"language":"kan","value":"TEST_CITYkan"},{"language":"hin","value":"TEST_CITYhin"},{"language":"tam","value":"TEST_CITYtam"}],"postalCode":"{{postalCode}}","fullName":[{"language":"eng","value":"TEST_FULLNAMEeng"},{"language":"ara","value":"TEST_FULLNAMEara"},{"language":"fra","value":"TEST_FULLNAMEfra"},{"language":"kan","value":"TEST_FULLNAMEkan"},{"language":"hin","value":"TEST_FULLNAMEhin"},{"language":"tam","value":"TEST_FULLNAMEtam"}],"dateOfBirth":"{{dateOfBirth}}","proofOfIdentity":{"format":"txt","type":"DOC001","value":"fileReferenceID"},"individualBiometrics":{"format":"cbeff","version":1,"value":"fileReferenceID"},"IDSchemaVersion":0.4,"province":[{"language":"eng","value":"TEST_PROVINCEeng"},{"language":"ara","value":"TEST_PROVINCEara"},{"language":"fra","value":"TEST_PROVINCEfra"},{"language":"kan","value":"TEST_PROVINCEkan"},{"language":"hin","value":"TEST_PROVINCEhin"},{"language":"tam","value":"TEST_PROVINCEtam"}],"zone":[{"language":"eng","value":"TEST_ZONEeng"},{"language":"ara","value":"TEST_ZONEara"},{"language":"fra","value":"TEST_ZONEfra"},{"language":"kan","value":"TEST_ZONEkan"},{"language":"hin","value":"TEST_ZONEhin"},{"language":"tam","value":"TEST_ZONEtam"}],"phone":"$PHONENUMBERFORIDENTITY$","addressLine1":[{"language":"eng","value":"TEST_ADDRESSLINE1eng"},{"language":"ara","value":"TEST_ADDRESSLINE1ara"},{"language":"fra","value":"TEST_ADDRESSLINE1fra"},{"language":"kan","value":"TEST_ADDRESSLINE1kan"},{"language":"hin","value":"TEST_ADDRESSLINE1hin"},{"language":"tam","value":"TEST_ADDRESSLINE1tam"}],"addressLine2":[{"language":"eng","value":"TEST_ADDRESSLINE2eng"},{"language":"ara","value":"TEST_ADDRESSLINE2ara"},{"language":"fra","value":"TEST_ADDRESSLINE2fra"},{"language":"kan","value":"TEST_ADDRESSLINE2kan"},{"language":"hin","value":"TEST_ADDRESSLINE2hin"},{"language":"tam","value":"TEST_ADDRESSLINE2tam"}],"UIN":"{{UIN}}","addressLine3":[{"language":"eng","value":"TEST_ADDRESSLINE3eng"},{"language":"ara","value":"TEST_ADDRESSLINE3ara"},{"language":"fra","value":"TEST_ADDRESSLINE3fra"},{"language":"kan","value":"TEST_ADDRESSLINE3kan"},{"language":"hin","value":"TEST_ADDRESSLINE3hin"},{"language":"tam","value":"TEST_ADDRESSLINE3tam"}],"region":[{"language":"eng","value":"TEST_REGIONeng"},{"language":"ara","value":"TEST_REGIONara"},{"language":"fra","value":"TEST_REGIONfra"},{"language":"kan","value":"TEST_REGIONkan"},{"language":"hin","value":"TEST_REGIONhin"},{"language":"tam","value":"TEST_REGIONtam"}],"email":"$EMAILVALUE$"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=mimoto/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a new identity for downloading issuer credential, uniqueIdentifier=TC_Mimoto_AddIdentity_03
Messages
Request: (End Point URL: https://api-internal.released.mosip.net/idrepository/v1/identity/)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
response.status ACTIVATED ACTIVATED PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.AddIdentity#Mimoto_AddIdentity_withValidParameters_smoke_Pos

Testcase Input
testCaseName=Mimoto_AddIdentity_withValidParameters_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "Mimoto_AddIdentity_withValidParameters_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","documents":[{"category":"{{category}}","value":"{{value}}"}],"identity":{"gender":[{"language":"eng","value":"MLE"},{"language":"ara","value":"MLE"},{"language":"fra","value":"MLE"},{"language":"kan","value":"MLE"},{"language":"hin","value":"MLE"},{"language":"tam","value":"MLE"}],"city":[{"language":"eng","value":"TEST_CITYeng"},{"language":"ara","value":"TEST_CITYara"},{"language":"fra","value":"TEST_CITYfra"},{"language":"kan","value":"TEST_CITYkan"},{"language":"hin","value":"TEST_CITYhin"},{"language":"tam","value":"TEST_CITYtam"}],"postalCode":"{{postalCode}}","fullName":[{"language":"eng","value":"TEST_FULLNAMEeng"},{"language":"ara","value":"TEST_FULLNAMEara"},{"language":"fra","value":"TEST_FULLNAMEfra"},{"language":"kan","value":"TEST_FULLNAMEkan"},{"language":"hin","value":"TEST_FULLNAMEhin"},{"language":"tam","value":"TEST_FULLNAMEtam"}],"dateOfBirth":"{{dateOfBirth}}","proofOfIdentity":{"format":"txt","type":"DOC001","value":"fileReferenceID"},"individualBiometrics":{"format":"cbeff","version":1,"value":"fileReferenceID"},"IDSchemaVersion":0.4,"province":[{"language":"eng","value":"TEST_PROVINCEeng"},{"language":"ara","value":"TEST_PROVINCEara"},{"language":"fra","value":"TEST_PROVINCEfra"},{"language":"kan","value":"TEST_PROVINCEkan"},{"language":"hin","value":"TEST_PROVINCEhin"},{"language":"tam","value":"TEST_PROVINCEtam"}],"zone":[{"language":"eng","value":"TEST_ZONEeng"},{"language":"ara","value":"TEST_ZONEara"},{"language":"fra","value":"TEST_ZONEfra"},{"language":"kan","value":"TEST_ZONEkan"},{"language":"hin","value":"TEST_ZONEhin"},{"language":"tam","value":"TEST_ZONEtam"}],"phone":"$PHONENUMBERFORIDENTITY$","addressLine1":[{"language":"eng","value":"TEST_ADDRESSLINE1eng"},{"language":"ara","value":"TEST_ADDRESSLINE1ara"},{"language":"fra","value":"TEST_ADDRESSLINE1fra"},{"language":"kan","value":"TEST_ADDRESSLINE1kan"},{"language":"hin","value":"TEST_ADDRESSLINE1hin"},{"language":"tam","value":"TEST_ADDRESSLINE1tam"}],"addressLine2":[{"language":"eng","value":"TEST_ADDRESSLINE2eng"},{"language":"ara","value":"TEST_ADDRESSLINE2ara"},{"language":"fra","value":"TEST_ADDRESSLINE2fra"},{"language":"kan","value":"TEST_ADDRESSLINE2kan"},{"language":"hin","value":"TEST_ADDRESSLINE2hin"},{"language":"tam","value":"TEST_ADDRESSLINE2tam"}],"UIN":"{{UIN}}","addressLine3":[{"language":"eng","value":"TEST_ADDRESSLINE3eng"},{"language":"ara","value":"TEST_ADDRESSLINE3ara"},{"language":"fra","value":"TEST_ADDRESSLINE3fra"},{"language":"kan","value":"TEST_ADDRESSLINE3kan"},{"language":"hin","value":"TEST_ADDRESSLINE3hin"},{"language":"tam","value":"TEST_ADDRESSLINE3tam"}],"region":[{"language":"eng","value":"TEST_REGIONeng"},{"language":"ara","value":"TEST_REGIONara"},{"language":"fra","value":"TEST_REGIONfra"},{"language":"kan","value":"TEST_REGIONkan"},{"language":"hin","value":"TEST_REGIONhin"},{"language":"tam","value":"TEST_REGIONtam"}],"email":"$EMAILVALUE$"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=mimoto/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a new identity with all valid parameters, uniqueIdentifier=TC_Mimoto_AddIdentity_01
Messages
Response:

Request: (End Point URL: https://api-internal.released.mosip.net/idrepository/v1/identity/)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
response.status ACTIVATED ACTIVATED PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_Generate_Perpetual_VID_Binding_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_Generate_Perpetual_VID_Binding_Valid_Smoke_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating perpetual VID with binding valid request, uniqueIdentifier=TC_Mimoto_GenerateVID_06
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_Generate_Perpetual_VID_InValid_Otp_sid

Testcase Input
testCaseName=Mimoto_Generate_Perpetual_VID_InValid_Otp_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "112637338", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Perpetual VID with invalid OTP, uniqueIdentifier=TC_Mimoto_GenerateVID_02
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_Generate_Perpetual_VID_Invalid_TransactionId_Neg

Testcase Input
testCaseName=Mimoto_Generate_Perpetual_VID_Invalid_TransactionId_Neg, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$trc45", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating perpetual VID with invalid transactionID, uniqueIdentifier=TC_Mimoto_GenerateVID_05
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_Generate_Perpetual_VID_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_Generate_Perpetual_VID_Valid_Smoke_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Perpetual VID with all valid parameters, uniqueIdentifier=TC_Mimoto_GenerateVID_01
Messages
Response:
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_Generate_Perpetual_VID_with_InvalidUIN_Valid_Otp_sid

Testcase Input
testCaseName=Mimoto_Generate_Perpetual_VID_with_InvalidUIN_Valid_Otp_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "253SDGSH@Y37", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Perpetual VID with invalid UIN, uniqueIdentifier=TC_Mimoto_GenerateVID_03
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#mimoto_Generate_Temporary_VID_Valid_Smoke_sid

Testcase Input
testCaseName=mimoto_Generate_Temporary_VID_Valid_Smoke_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Temporary", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating temporary VID with all valid request, uniqueIdentifier=TC_Mimoto_GenerateVID_04
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_Generate_Perpetual_VID_Binding_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_Generate_Perpetual_VID_Binding_Valid_Smoke_sid, endPoint=/idrepository/v1/vid, role=idrepo, templateFields=null, input={ "vidType": "Perpetual", "UIN": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "version": "v1", "id": "mosip.vid.create", "requesttime": "$TIMESTAMP$" }, output={ "vidStatus":"ACTIVE" }, inputTemplate=mimoto/CreateVID/createVid, outputTemplate=mimoto/CreateVID/createVidResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create perpetual VID for binding with valid details, uniqueIdentifier=TC_Mimoto_GenerateVID_06
Messages
Request: (End Point URL: https://api-internal.released.mosip.net/idrepository/v1/vid)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
response.vidStatus ACTIVE ACTIVE PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_Generate_Perpetual_VID_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_Generate_Perpetual_VID_Valid_Smoke_sid, endPoint=/idrepository/v1/vid, role=idrepo, templateFields=null, input={ "vidType": "Perpetual", "UIN": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "version": "v1", "id": "mosip.vid.create", "requesttime": "$TIMESTAMP$" }, output={ "vidStatus":"ACTIVE" }, inputTemplate=mimoto/CreateVID/createVid, outputTemplate=mimoto/CreateVID/createVidResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create perpetual VID with valid details, uniqueIdentifier=TC_Mimoto_GenerateVID_01
Messages
Request: (End Point URL: https://api-internal.released.mosip.net/idrepository/v1/vid)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
response.vidStatus ACTIVE ACTIVE PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_Generate_Temporary_VID_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_Generate_Temporary_VID_Valid_Smoke_sid, endPoint=/idrepository/v1/vid, role=idrepo, templateFields=null, input={ "vidType": "Perpetual", "UIN": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "version": "v1", "id": "mosip.vid.create", "requesttime": "$TIMESTAMP$" }, output={ "vidStatus":"ACTIVE" }, inputTemplate=mimoto/CreateVID/createVid, outputTemplate=mimoto/CreateVID/createVidResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create temporary VID with valid details, uniqueIdentifier=TC_Mimoto_GenerateVID_04
Messages
Request: (End Point URL: https://api-internal.released.mosip.net/idrepository/v1/vid)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
response.vidStatus ACTIVE ACTIVE PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid

Testcase Input
testCaseName=Mimoto_ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid, endPoint=/api/v1/Insurance, role=resident, templateFields=null, input={ "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$", "policyName": "Start Insurance Gold Premium", "policyExpiresOn": "2033-04-20T20:48:17.684Z", "policyIssuedOn": "$TIMESTAMP$", "fullName" : "$FULLNAMEFORSUNBIRDRC$", "dob" : "$DOBFORSUNBIRDRC$", "benefits": [{"benefits": "Critical Surgery"}, {"benefits": "Full body checkup"}], "gender": "Male", "mobile": "0123456789", "email": "abhishek@gmail.com" }, output={ "status": "SUCCESSFUL" }, inputTemplate=mimoto/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR, outputTemplate=mimoto/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdRResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_CreatePolicySunBirdR_01
Messages
Request: (End Point URL: https://registry.released.mosip.net/api/v1/Insurance)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
params.status SUCCESSFUL SUCCESSFUL PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_ESignet_SunBirdR_GetPolicy_NOAUTH_Valid_Smoke

Testcase Input
testCaseName=Mimoto_ESignet_SunBirdR_GetPolicy_NOAUTH_Valid_Smoke, endPoint=/api/v1/Insurance/{insuranceid}, role=resident, templateFields=null, input={ "insuranceid": "$ID:ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" }, output={ "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$" }, inputTemplate=mimoto/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR, outputTemplate=mimoto/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdRResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Getting sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_GetPolicySunBirdR_01
Messages
Request: (End Point URL: https://registry.released.mosip.net/api/v1/Insurance/{insuranceid})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
policyNumber 456239038 456239038 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_ESignet_SunBirdR_SearchPolicy_NOAUTH_Valid_Smoke

Testcase Input
testCaseName=Mimoto_ESignet_SunBirdR_SearchPolicy_NOAUTH_Valid_Smoke, endPoint=/api/v1/Insurance/search, role=resident, templateFields=null, input={ "offset": "0", "limit": "5", "fullName": "$FULLNAMEFORSUNBIRDRC$", "dob": "$DOBFORSUNBIRDRC$", "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$" }, output={ }, inputTemplate=mimoto/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR, outputTemplate=mimoto/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdRResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Searching sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_SearchPolicySunBirdR_01
Messages
Request: (End Point URL: https://registry.released.mosip.net/api/v1/Insurance/search)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORMOSIPIDFROMMIMOTOACTUATOR$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=mimoto/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Oauth's details with all valid parameters, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequest_01
Messages
Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/v2/oauth-details)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_ESignet_AuthenticateUserIDP_uin_Otp_Valid_Smoke

Testcase Input
testCaseName=Mimoto_ESignet_AuthenticateUserIDP_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "mimoto/SendOtpEsignet/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=mimoto/AuthenticateUser/AuthenticateUser, outputTemplate=mimoto/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user to download credentials with all valid parameters, uniqueIdentifier=TC_Mimoto_AuthenticateUser_01
Messages
Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/send-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/authenticate)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=mimoto/AuthorizationCode/AuthorizationCode, outputTemplate=mimoto/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate authorization code to download credential issuer, uniqueIdentifier=TC_Mimoto_AuthorizationCode_01
Messages
Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/auth-code)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORINSURANCEFROMMIMOTOACTUATOR$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=mimoto/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Getting auth details for downloading sunbird credentials, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequestSunBirdC_01
Messages
Request: (End Point URL: https://esignet-insurance.released.mosip.net/v1/esignet/authorization/v2/oauth-details)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_ESignet_AuthenticateUser_SunBirdC_Valid_Smoke

Testcase Input
testCaseName=Mimoto_ESignet_AuthenticateUser_SunBirdC_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "$SUNBIRDINSURANCEAUTHFACTORTYPE$", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=mimoto/SunBirdC/AuthenticateUserSunBirdC/AuthenticateUserSunBirdC, outputTemplate=mimoto/SunBirdC/AuthenticateUserSunBirdC/AuthenticateUserSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticating user for downloading sunbird credential, uniqueIdentifier=TC_Mimoto_AuthenticateUserSunBirdC_01
Messages
Request: (End Point URL: https://esignet-insurance.released.mosip.net/v1/esignet/authorization/authenticate)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp"}] }, output={ }, inputTemplate=mimoto/SunBirdC/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdC, outputTemplate=mimoto/SunBirdC/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating authorization code for downloading sunbird VC, uniqueIdentifier=TC_Mimoto_AuthorizationCodeSunBirdC_01
Messages
Request: (End Point URL: https://esignet-insurance.released.mosip.net/v1/esignet/authorization/auth-code)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithFormDataBodyForPdfDownload#Mimoto_DownloadIssuerCredential_Invalid_AuthorizationCode_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredential_Invalid_AuthorizationCode_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "XjIsJgQAX3lrhMmXgRn-jerNMCqf0GdiBLx5MbMig", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MOSIPVerifiableCredential" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid credential AuthorizationCode, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_04
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/credentials/download)

Exception : PDF header signature not found.
Response:
nullNot able to download issuer credential

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithFormDataBodyForPdfDownload#Mimoto_DownloadIssuerCredential_Invalid_Credential_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredential_Invalid_Credential_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MOSIPVerifiableCredentialInvalid" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid credential, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/credentials/download)

Exception : PDF header signature not found.
Response:
nullNot able to download issuer credential

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithFormDataBodyForPdfDownload#Mimoto_DownloadIssuerCredential_Invalid_Issuer_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredential_Invalid_Issuer_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "MosipInvalid", "credential": "MOSIPVerifiableCredential" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid issuer, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/credentials/download)

Exception : PDF header signature not found.
Response:
nullNot able to download issuer credential

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithFormDataBodyForPdfDownload#Mimoto_DownloadIssuerCredential_IssuerMosip_All_Valid_Smoke

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredential_IssuerMosip_All_Valid_Smoke, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MOSIPVerifiableCredential" }, output={ }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with all valid parameters, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/credentials/download)

Response:
nullMOSIP National ID
Full Name
TEST_FULLNAMEeng
Phone Number
5405251927
Gender
MLE
Email Id
Mimoto_AddIdentity_downloadIssuerCredential_smoke_Pos@mosip
.net
City
TEST_CITYeng
UIN
3049132073

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithFormDataBodyForPdfDownload#Mimoto_DownloadIssuerCredential_IssuerSunBird_All_Valid_Smoke

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredential_IssuerSunBird_All_Valid_Smoke, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credential": "InsuranceCredential" }, output={ }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading sunbird credential with valid authorizationCode, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_06
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/credentials/download)

Response:
nullHealth Insurance
Name
Bernardo Little 
Sr.
Policy Number
456239038
Policy Name Policy Issued On
Start Insurance Gold Premium 2025-08-18
Policy Expires On
2033-04-20
Benefits
Critical Surgery, Full body checkup
Phone Number Email Id
0123456789 abhishek@gmail.com
Gender Date of Birth
Male 1981-11-19
This credential is limited to a maximum of 1 verifications by authorized verifiers. Once the specified number of 
verifications has been reached, this credential will no longer be valid for further verification attempts.

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithFormDataBodyForPdfDownload#Mimoto_DownloadIssuerCredential_Reused_AuthorizationCode_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredential_Reused_AuthorizationCode_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MOSIPVerifiableCredential" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid expired authorizationCode, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_05
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/credentials/download)

Exception : PDF header signature not found.
Response:
nullNot able to download issuer credential

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AuthLock_InValid_Otp_All

Testcase Input
testCaseName=Mimoto_AuthLock_InValid_Otp_All, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "111sss@@1", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth Lock a particular UIN with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_02
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AuthLock_Valid_UIN_All

Testcase Input
testCaseName=Mimoto_AuthLock_Valid_UIN_All, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/AuthLock/createAuthLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular UIN with valid parameters, uniqueIdentifier=TC_Mimoto_AuthLock_01
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AuthLock_Valid_VID_All

Testcase Input
testCaseName=Mimoto_AuthLock_Valid_VID_All, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/AuthLock/createAuthLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular VID with valid VID, uniqueIdentifier=TC_Mimoto_AuthLock_04
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AuthLock_invalidVID_Valid_Otp

Testcase Input
testCaseName=Mimoto_AuthLock_invalidVID_Valid_Otp, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "36363gvb", "individualIdType": "VID", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular VID with invalid VID, uniqueIdentifier=TC_Mimoto_AuthLock_06
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AuthLock_with_invalidUIN_Valid_Otp_sid

Testcase Input
testCaseName=Mimoto_AuthLock_with_invalidUIN_Valid_Otp_sid, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "263738@@#FDCVvb", "individualIdType": "UIN", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth Lock a particular UIN with valid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_03
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AuthLock_with_invalidVID_Valid_Otp

Testcase Input
testCaseName=Mimoto_AuthLock_with_invalidVID_Valid_Otp, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "26DBDB@73", "individualIdType": "VID", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular VID with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_05
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AuthUnLock_InValid_OTP_With_VID_All

Testcase Input
testCaseName=Mimoto_AuthUnLock_InValid_OTP_With_VID_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "11111@@###1", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock a particular VID with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_10
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AuthUnLock_Valid_UIN_All

Testcase Input
testCaseName=Mimoto_AuthUnLock_Valid_UIN_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/AuthUnLock/createAuthUnLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth unlock a particular UIN with valid parameters, uniqueIdentifier=TC_Mimoto_AuthLock_07
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AuthUnLock_Valid_UIN_With_VID_All

Testcase Input
testCaseName=Mimoto_AuthUnLock_Valid_UIN_With_VID_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/AuthUnLock/createAuthUnLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth unlock a particular VID with valid parameters, uniqueIdentifier=TC_Mimoto_AuthLock_08
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AuthUnLock_With_InValid_OTP_All

Testcase Input
testCaseName=Mimoto_AuthUnLock_With_InValid_OTP_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "111@@@###hhdhdh111", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth unlock a particular UIN with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_09
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_RequestCredentials_All_Valid_Smoke_with_VID_sid

Testcase Input
testCaseName=Mimoto_RequestCredentials_All_Valid_Smoke_with_VID_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "id": "$IGNORE$", "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/CredentialIssuance/RequestCredentials/ReqCredentialResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with valid VID, uniqueIdentifier=TC_Mimoto_RequestCredentials_02
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_RequestCredentials_InValid_Otp_UIN_sid

Testcase Input
testCaseName=Mimoto_RequestCredentials_InValid_Otp_UIN_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "user": "abc", "otp": "4h4hnn", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting UIN credential with invalid OTP, uniqueIdentifier=TC_Mimoto_RequestCredentials_03
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_RequestCredentials_InValid_TransactionId_sid

Testcase Input
testCaseName=Mimoto_RequestCredentials_InValid_TransactionId_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "4dhn@@##&%", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with invalid transactionID, uniqueIdentifier=TC_Mimoto_RequestCredentials_04
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_RequestCredentials_InValid_UIN_sid

Testcase Input
testCaseName=Mimoto_RequestCredentials_InValid_UIN_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ght56=", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with invalid UIN, uniqueIdentifier=TC_Mimoto_RequestCredentials_05
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_RequestCredentials_Invalid_VID_sid_Neg

Testcase Input
testCaseName=Mimoto_RequestCredentials_Invalid_VID_sid_Neg, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$hfg56", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with invalid VID, uniqueIdentifier=TC_Mimoto_RequestCredentials_06
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_RequestCredentials__All_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_RequestCredentials__All_Valid_Smoke_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "id": "$IGNORE$", "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/CredentialIssuance/RequestCredentials/ReqCredentialResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with all valid parameters, uniqueIdentifier=TC_Mimoto_RequestCredentials_01
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_CredentialsStatus_euin_All_Valid_Smoke

Testcase Input
testCaseName=Mimoto_CredentialsStatus_euin_All_Valid_Smoke, endPoint=/v1/mimoto/credentialshare/request/status/{requestId}, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials__All_Valid_Smoke_sid_requestId$" }, output={ "statusCode": "ISSUED" }, inputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatus, outputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatusResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving credential status with valid UIN, uniqueIdentifier=TC_Mimoto_CredentialsStatus_01
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam.test(GetWithParam.java:87) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_CredentialsStatus_euin_With_Invalid_RequestId_Neg

Testcase Input
testCaseName=Mimoto_CredentialsStatus_euin_With_Invalid_RequestId_Neg, endPoint=/v1/mimoto/credentialshare/request/status/{requestId}, role=resident, templateFields=null, input={ "requestId": "$er45" }, output={ "errors": [ { "errorCode": "RES-SER-29" } ] }, inputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatus, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving credential status with invalid requestId, uniqueIdentifier=TC_Mimoto_CreateVID_03
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam.test(GetWithParam.java:87) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_CredentialsStatus_euin_With_VID_All_Valid_Smoke

Testcase Input
testCaseName=Mimoto_CredentialsStatus_euin_With_VID_All_Valid_Smoke, endPoint=/v1/mimoto/credentialshare/request/status/{requestId}, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials_All_Valid_Smoke_with_VID_sid_requestId$" }, output={ "statusCode": "ISSUED" }, inputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatus, outputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatusResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving credential status with valid VID, uniqueIdentifier=TC_Mimoto_CredentialsStatus_02
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam.test(GetWithParam.java:87) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_CredentialsStatus_All_Valid_Smoke_euin

Testcase Input
testCaseName=Mimoto_CredentialsStatus_All_Valid_Smoke_euin, endPoint=/v1/mimoto/credentialshare/download, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials__All_Valid_Smoke_sid_requestId$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$" }, output= { "Content-Type": "application/pdf" }, inputTemplate=mimoto/CredentialIssuance/DownloadWithReqid/downloadwithreqid, outputTemplate=mimoto/CredentialIssuance/DownloadWithReqid/downloadwithreqidResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking credential status with all valid parameters, uniqueIdentifier=TC_Mimoto_DownloadCredential_01
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.SimplePost.test(SimplePost.java:87) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_CredentialsStatus_StatusCode_InValid_Smoke_euin

Testcase Input
testCaseName=Mimoto_CredentialsStatus_StatusCode_InValid_Smoke_euin, endPoint=/v1/mimoto/credentialshare/download, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials__All_Valid_Smoke_sid_requestId$", "individualId": "965337484848041697" }, output=404, inputTemplate=mimoto/CredentialIssuance/DownloadWithReqid/downloadwithreqid, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking credential status with invalid StatusCode, uniqueIdentifier=TC_Mimoto_DownloadCredential_02
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.SimplePost.test(SimplePost.java:87) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_individualOTP_All_Valid_Smoke

Testcase Input
testCaseName=Mimoto_individualOTP_All_Valid_Smoke, endPoint=/v1/mimoto/req/individualId/otp, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$" }, output={ }, inputTemplate=mimoto/SendOTPUIN/individualIdOtp, outputTemplate=mimoto/SendOTPUIN/individualIdOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=generating individual OTP with valid parameters, uniqueIdentifier=TC_Mimoto_individualOTP_01
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.SimplePost.test(SimplePost.java:87) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AidGetIndividualId_Getting_With_Invalid_AID_Neg

Testcase Input
testCaseName=Mimoto_AidGetIndividualId_Getting_With_Invalid_AID_Neg, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "$yt55g", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with invalid AID, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_02
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AidGetIndividualId_Getting_With_Invalid_Otp_Neg

Testcase Input
testCaseName=Mimoto_AidGetIndividualId_Getting_With_Invalid_Otp_Neg, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "1234", "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with Invalid OTP, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_03
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AidGetIndividualId_Getting_With_Invalid_lenght_Of_AID_Neg

Testcase Input
testCaseName=Mimoto_AidGetIndividualId_Getting_With_Invalid_lenght_Of_AID_Neg, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "2745538921628455389216202302041241544770230204124154278477", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-457" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with invalid lengh of AID, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_05
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AidGetIndividualId_Getting_With_Valid_Otp_All

Testcase Input
testCaseName=Mimoto_AidGetIndividualId_Getting_With_Valid_Otp_All, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "aidStatus": "PROCESSED", "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/AidGetIndividualId/aidGetIndividualIdResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with valid OTP, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_04
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_AidGetIndividualId_Getting_With_Valid_UIN_All

Testcase Input
testCaseName=Mimoto_AidGetIndividualId_Getting_With_Valid_UIN_All, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "aidStatus": "PROCESSED", "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/AidGetIndividualId/aidGetIndividualIdResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating AID status with valid AID, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_01
Output Validation Exception
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:106) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_Valid_vid_All_Smoke

Testcase Input
testCaseName=Mimoto_BindingOtp_Valid_vid_All_Smoke, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "maskedMobile": "$IGNORE$" }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/BindingOtp/BindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with valid VID, uniqueIdentifier=TC_Mimoto_BindingOtp_02
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.SimplePost.test(SimplePost.java:87) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Empty_OtpChannel_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Empty_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": "" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel being empty, uniqueIdentifier=TC_Mimoto_BindingOtp_13
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_otp_channel invalid_otp_channel PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Empty_OtpChannels_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Empty_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel being empty, uniqueIdentifier=TC_Mimoto_BindingOtp_10
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_otp_channel invalid_otp_channel PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Empty_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Empty_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with empty request time, uniqueIdentifier=TC_Mimoto_BindingOtp_19
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Empty_individualId_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Empty_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with individualId missing, uniqueIdentifier=TC_Mimoto_BindingOtp_05
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_identifier invalid_identifier PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Future_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Future_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with future request time, uniqueIdentifier=TC_Mimoto_BindingOtp_17
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Invalid_OtpChannels_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Invalid_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "sdsgsg"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid OTP channel, uniqueIdentifier=TC_Mimoto_BindingOtp_08
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Invalid_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid request time, uniqueIdentifier=TC_Mimoto_AuthLock_07
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Invalid_individualId_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Invalid_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "@#DSDFD@#", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid UIN, uniqueIdentifier=TC_Mimoto_BindingOtp_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode IDA-MLC-009 IDA-MLC-009 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Missing_OtpChannel_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Missing_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$" }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel missing, uniqueIdentifier=TC_Mimoto_BindingOtp_12
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Missing_OtpChannels_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Missing_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "$IGNORE$"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel missing, uniqueIdentifier=TC_Mimoto_BindingOtp_09
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Missing_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Missing_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$IGNORE$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with missing request time, uniqueIdentifier=TC_Mimoto_BindingOtp_18
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Missing_individualId_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Missing_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID without individualId attribute, uniqueIdentifier=TC_Mimoto_BindingOtp_04
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Null_OtpChannel_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Null_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": "null" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel being empty, uniqueIdentifier=TC_Mimoto_BindingOtp_14
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_otp_channel invalid_otp_channel PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Null_OtpChannels_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Null_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "null"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel value being null, uniqueIdentifier=TC_Mimoto_BindingOtp_11
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Null_individualId_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Null_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with individualId value as null, uniqueIdentifier=TC_Mimoto_BindingOtp_06
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode IDA-MLC-009 IDA-MLC-009 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_Past_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_Past_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with past request time, uniqueIdentifier=TC_Mimoto_BindingOtp_16
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_UIN_SpaceSeparated_otpChannels_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_UIN_SpaceSeparated_otpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "E M A I L"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel value been spaced in between, uniqueIdentifier=TC_Mimoto_BindingOtp_07
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_Valid_UIN_All_Smoke

Testcase Input
testCaseName=Mimoto_BindingOtp_Valid_UIN_All_Smoke, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "maskedMobile": "$IGNORE$" }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/BindingOtp/BindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with valid UIN, uniqueIdentifier=TC_Mimoto_BindingOtp_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Empty_OtpChannel_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Empty_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": "" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values empty, uniqueIdentifier=TC_Mimoto_BindingOtp_30
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_otp_channel invalid_otp_channel PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Empty_OtpChannels_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Empty_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with empty OTP channel values, uniqueIdentifier=TC_Mimoto_BindingOtp_27
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_otp_channel invalid_otp_channel PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Empty_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Empty_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with request time empty, uniqueIdentifier=TC_Mimoto_BindingOtp_36
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Empty_individualId_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Empty_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with empty VID, uniqueIdentifier=TC_Mimoto_BindingOtp_22
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_identifier invalid_identifier PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Future_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Future_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with future request time, uniqueIdentifier=TC_Mimoto_BindingOtp_34
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Invalid_OtpChannels_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Invalid_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "sdsgsg"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with invalid OTP channel, uniqueIdentifier=TC_Mimoto_BindingOtp_25
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Invalid_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with invalid request time, uniqueIdentifier=TC_Mimoto_BindingOtp_32
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Invalid_individualId_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Invalid_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "@#DSDFD@#", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid VID, uniqueIdentifier=TC_Mimoto_BindingOtp_20
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode IDA-MLC-009 IDA-MLC-009 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Missing_OtpChannel_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Missing_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$" }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values missing, uniqueIdentifier=TC_Mimoto_BindingOtp_29
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Missing_OtpChannels_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Missing_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "$IGNORE$"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with missing OTP channel values, uniqueIdentifier=TC_Mimoto_BindingOtp_26
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Missing_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Missing_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$IGNORE$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with request time missing, uniqueIdentifier=TC_Mimoto_BindingOtp_35
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Missing_individualId_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Missing_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with missing VID, uniqueIdentifier=TC_Mimoto_BindingOtp_21
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Null_OtpChannel_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Null_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": "null" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values as null, uniqueIdentifier=TC_Mimoto_BindingOtp_31
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_otp_channel invalid_otp_channel PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Null_OtpChannels_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Null_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "null"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values as null, uniqueIdentifier=TC_Mimoto_BindingOtp_28
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Null_individualId_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Null_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid VID, uniqueIdentifier=TC_Mimoto_BindingOtp_23
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode IDA-MLC-009 IDA-MLC-009 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_Past_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_Past_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with past request time, uniqueIdentifier=TC_Mimoto_BindingOtp_33
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_BindingOtp_vid_SpaceSeparated_otpChannels_Neg

Testcase Input
testCaseName=Mimoto_BindingOtp_vid_SpaceSeparated_otpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "E M A I L"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel value been spaced in between, uniqueIdentifier=TC_Mimoto_BindingOtp_24
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-011 RESIDENT-APP-011 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_OTP_Valid_Smoke

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_OTP_Valid_Smoke, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with valid VID, uniqueIdentifier=TC_Mimoto_WalletBinding_02
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Empty_AuthFactorType_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Empty_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with empty authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_14
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Empty_Challenge_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Empty_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_length" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with empty challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_20
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Empty_Formate_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Empty_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with empty formate, uniqueIdentifier=TC_Mimoto_WalletBinding_25
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Empty_IndividualId_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Empty_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_09
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_individual_id invalid_individual_id PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Empty_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Empty_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty requestime, uniqueIdentifier=TC_Mimoto_WalletBinding_06
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Empty_authFactorType1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Empty_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_30
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type invalid_auth_factor_type PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Empty_format1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Empty_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty format1, uniqueIdentifier=TC_Mimoto_WalletBinding_35
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_challenge_format invalid_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_FutureVal_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_FutureVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with future request time, uniqueIdentifier=TC_Mimoto_WalletBinding_05
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Invalid_AuthFactorType_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Invalid_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "dfg5", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with invalid authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_13
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Invalid_Challenge_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Invalid_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "gd5$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with invalid challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_18
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Invalid_Formate_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Invalid_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "GT$r5", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with invalid formate, uniqueIdentifier=TC_Mimoto_WalletBinding_23
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Invalid_IndividualId_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Invalid_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$tyhg", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind VC with invalid individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_08
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Invalid_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "asdf$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid request time, uniqueIdentifier=TC_Mimoto_WalletBinding_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Invalid_authFactorType1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Invalid_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "hy$5", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_28
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Invalid_format1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Invalid_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "hju$5", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid format1, uniqueIdentifier=TC_Mimoto_WalletBinding_33
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Invalid_publicKey_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Invalid_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "ghj$4", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_38
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-028 RESIDENT-APP-028 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Missing_AuthFactorType_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Missing_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "$REMOVE$", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with missing authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_15
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Missing_Challenge_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Missing_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$REMOVE$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_length" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with missing challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_19
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Missing_Formate_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Missing_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "$REMOVE$", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with missing formate, uniqueIdentifier=TC_Mimoto_WalletBinding_24
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Missing_IndividualId_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Missing_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with individualId being missing, uniqueIdentifier=TC_Mimoto_WalletBinding_11
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_individual_id invalid_individual_id PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Missing_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Missing_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing requestime, uniqueIdentifier=TC_Mimoto_WalletBinding_07
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Missing_authFactorType1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Missing_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "$REMOVE$", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_29
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type invalid_auth_factor_type PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Missing_format1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Missing_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "$REMOVE$", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing format1, uniqueIdentifier=TC_Mimoto_WalletBinding_34
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_challenge_format invalid_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Missing_publicKey_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Missing_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$REMOVE$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_40
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-028 RESIDENT-APP-028 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Null_AuthFactorType_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Null_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "null", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with authfactortype value being just null, uniqueIdentifier=TC_Mimoto_WalletBinding_17
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Null_Challenge_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Null_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "null", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with challenge value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_22
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_challenge invalid_challenge PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Null_Formate_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Null_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "null", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with formate value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_27
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Null_IndividualId_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Null_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind VC with individualId being null, uniqueIdentifier=TC_Mimoto_WalletBinding_10
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Null_authFactorType1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Null_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "null", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with authFactorType1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_32
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Null_format1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Null_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "null", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with format1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_37
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_Null_publicKey_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_Null_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "null", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with null as publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_39
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-028 RESIDENT-APP-028 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_OTP_Valid_Smoke

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_OTP_Valid_Smoke, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with valid UIN, uniqueIdentifier=TC_Mimoto_WalletBinding_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_PastVal_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_PastVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with past request time, uniqueIdentifier=TC_Mimoto_WalletBinding_04
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_SpaceVal_AuthFactorType_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_SpaceVal_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": " ", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with authfactortype value being just space, uniqueIdentifier=TC_Mimoto_WalletBinding_16
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_SpaceVal_Challenge_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_SpaceVal_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": " ", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_length" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with challenge value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_21
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_SpaceVal_Formate_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_SpaceVal_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": " ", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with formate value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_26
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_SpaceVal_IndividualId_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_SpaceVal_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": " ", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with individualId value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_12
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_individual_id invalid_individual_id PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_SpaceVal_authFactorType1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_SpaceVal_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": " ", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with authFactorType1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_31
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_uin_SpaceVal_format1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_uin_SpaceVal_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": " ", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with format1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_36
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Empty_AuthFactorType_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Empty_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with empty authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_52
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Empty_Challenge_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Empty_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with empty challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_58
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Empty_Formate_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Empty_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VID VC with empty formate, uniqueIdentifier=TC_Mimoto_WalletBinding_63
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Empty_IndividualId_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Empty_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with empty individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_47
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_individual_id invalid_individual_id PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Empty_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Empty_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with empty request time, uniqueIdentifier=TC_Mimoto_WalletBinding_44
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Empty_authFactorType1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Empty_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with empty authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_68
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type invalid_auth_factor_type PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Empty_format1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Empty_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with empty format1, uniqueIdentifier=TC_Mimoto_WalletBinding_73
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_challenge_format invalid_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_FutureVal_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_FutureVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with future request time, uniqueIdentifier=TC_Mimoto_WalletBinding_43
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Invalid_AuthFactorType_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Invalid_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "dfg5", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with invalid authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_51
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Invalid_Challenge_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Invalid_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "gd5$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with invalid challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_56
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Invalid_Formate_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Invalid_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "GT$r5", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid formate, uniqueIdentifier=TC_Mimoto_WalletBinding_61
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_challenge_format invalid_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Invalid_IndividualId_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Invalid_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$tyhg", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind vid VC with invalid individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_46
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Invalid_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "asdf$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with invalid request time, uniqueIdentifier=TC_Mimoto_WalletBinding_41
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Invalid_authFactorType1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Invalid_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "hy$5", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_66
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Invalid_format1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Invalid_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "hju$5", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid format1, uniqueIdentifier=TC_Mimoto_WalletBinding_71
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Invalid_publicKey_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Invalid_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "ghj$4", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_76
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-028 RESIDENT-APP-028 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Missing_AuthFactorType_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Missing_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "$REMOVE$", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with missing authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_53
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Missing_Challenge_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Missing_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$REMOVE$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with missing challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_57
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Missing_Formate_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Missing_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "$REMOVE$", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VID VC with missing formate, uniqueIdentifier=TC_Mimoto_WalletBinding_62
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Missing_IndividualId_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Missing_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with missing individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_49
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_individual_id invalid_individual_id PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Missing_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Missing_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with missing request time, uniqueIdentifier=TC_Mimoto_WalletBinding_45
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Missing_authFactorType1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Missing_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "$REMOVE$", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with missing authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_67
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type invalid_auth_factor_type PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Missing_format1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Missing_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "$REMOVE$", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with missing format1, uniqueIdentifier=TC_Mimoto_WalletBinding_72
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_challenge_format invalid_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Missing_publicKey_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Missing_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$REMOVE$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with missing publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_78
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-028 RESIDENT-APP-028 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Null_AuthFactorType_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Null_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "null", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with authfactortype value being just null, uniqueIdentifier=TC_Mimoto_WalletBinding_55
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type invalid_auth_factor_type PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Null_Challenge_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Null_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "null", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with challenge value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_60
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_challenge invalid_challenge PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Null_Formate_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Null_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "null", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with formate value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_65
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_challenge_format invalid_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Null_IndividualId_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Null_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind vid VC with null individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_48
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Null_authFactorType1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Null_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "null", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with authFactorType1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_70
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Null_format1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Null_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "null", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with format1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_75
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_Null_publicKey_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_Null_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "null", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with null as publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_77
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-028 RESIDENT-APP-028 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_PastVal_RequestTime_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_PastVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with past request time, uniqueIdentifier=TC_Mimoto_WalletBinding_42
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_SpaceVal_AuthFactorType_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_SpaceVal_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": " ", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with authfactortype value being just space, uniqueIdentifier=TC_Mimoto_WalletBinding_54
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_SpaceVal_Challenge_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_SpaceVal_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": " ", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with challenge value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_59
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_SpaceVal_Formate_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_SpaceVal_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": " ", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VID VC with formate value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_64
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_SpaceVal_IndividualId_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_SpaceVal_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": " ", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with individualId value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_50
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_individual_id invalid_individual_id PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_SpaceVal_authFactorType1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_SpaceVal_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": " ", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with authFactorType1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_69
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate#Mimoto_WalletBinding_vid_SpaceVal_format1_Neg

Testcase Input
testCaseName=Mimoto_WalletBinding_vid_SpaceVal_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": " ", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with format1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_74
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/binding-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallet-binding)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode invalid_auth_factor_type_or_challenge_format invalid_auth_factor_type_or_challenge_format PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetAllIssuers_All_Valid_Smoke

Testcase Input
testCaseName=Mimoto_GetAllIssuers_All_Valid_Smoke, endPoint=/v1/mimoto/issuers, role=resident, templateFields=null, input={ }, output={ }, inputTemplate=mimoto/GetAllIssuers/GetAllIssuers, outputTemplate=mimoto/GetAllIssuers/GetAllIssuersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving issuers with all valid parameters, uniqueIdentifier=TC_Mimoto_GetAllIssuers_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/issuers)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetAllIssuers_Invalid_Issuer_Neg

Testcase Input
testCaseName=Mimoto_GetAllIssuers_Invalid_Issuer_Neg, endPoint=/v1/mimoto/issuers/invalid, role=resident, templateFields=null, input={ }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/GetAllIssuers/GetAllIssuers, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving invalid issuer, uniqueIdentifier=TC_Mimoto_GetAllIssuers_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/issuers/invalid)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-035 RESIDENT-APP-035 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetAllIssuers_Specific_Issuer_All_Valid_Smoke

Testcase Input
testCaseName=Mimoto_GetAllIssuers_Specific_Issuer_All_Valid_Smoke, endPoint=/v1/mimoto/issuers/Mosip, role=resident, templateFields=null, input={ }, output={ }, inputTemplate=mimoto/GetAllIssuers/GetAllIssuers, outputTemplate=mimoto/GetAllIssuers/GetAllIssuersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all specific issuer with all valid parameters, uniqueIdentifier=TC_Mimoto_GetAllIssuers_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/issuers/Mosip)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetIssuerWellKnown_All_Valid_Smoke

Testcase Input
testCaseName=Mimoto_GetIssuerWellKnown_All_Valid_Smoke, endPoint=/v1/mimoto/issuers/{issuerId}/well-known-proxy, role=resident, templateFields=null, input={ "issuerId": "Mosip", "credentialType": "$REMOVE$" }, output={ }, inputTemplate=mimoto/GetIssuerWellKnown/GetIssuerWellKnown, outputTemplate=mimoto/GetIssuerWellKnown/GetIssuerWellKnownResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating the issuer well known with all valid parameters, uniqueIdentifier=null
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/issuers/{issuerId}/well-known-proxy)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_GoogleLoginToken_EmptyToken_Neg

Testcase Input
testCaseName=Mimoto_GoogleLoginToken_EmptyToken_Neg, endPoint=/v1/mimoto/auth/google/token-login, role=userDefinedCookie, templateFields=null, input={ "cookie": "" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Authorization/GoogleLoginToken/GoogleLoginToken, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating the sesion token for google login with expired token and expects it to fail, uniqueIdentifier=TC_Mimoto_GoogleLoginToken_05
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/auth/google/token-login)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_GoogleLoginToken_ExpiredToken_Neg

Testcase Input
testCaseName=Mimoto_GoogleLoginToken_ExpiredToken_Neg, endPoint=/v1/mimoto/auth/google/token-login, role=userDefinedCookie, templateFields=null, input={ "cookie": "eyJhbGciOiJSUzI1NiIsImtpZCI6IjFiYjc3NGJkODcyOWVhMzhlOWMyZmUwYzY0ZDJjYTk0OGJmNjZmMGYiLCJ0eXAiOiJKV1QifQ.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.YGH3pgVvZoXyXS_eUPLmul5AXMdAdVaAoJRBJty_ZYBy7oKT7FGKwhJ9bLhXLiRG031noCaM-3EYv2N2oezvApuOGYM6xK5Mb6WdGzv-y0oR-00wniTTbuUEtgZGxPunZ2lfrI6WwkIq8JHhFh1_l4SnRGYfRqNA-vhLNMfcZsm0yG9NAt6TWgHEqy_JtMXSQTsvLfLijCLOqZCfQuTDqzk5EhtGaEMtppPN_au-Xc8fTDhY0nZtWTQ2262nqLXGSomika66dKH1SU50DtQEEdtz8Cbo_li5S4hSV1nDa7MzbIgiVqqN6fFalxRy4kvvvvaWNj7U46DsKjunINoNMQ" }, output={ "errorCode": "invalid_token" }, inputTemplate=mimoto/LoginFlow/Authorization/GoogleLoginToken/GoogleLoginToken, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating the sesion token for google login with expired token and expects it to fail, uniqueIdentifier=TC_Mimoto_GoogleLoginToken_04
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/auth/google/token-login)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_token invalid_token PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_GoogleLoginToken_InvalidToken_Neg

Testcase Input
testCaseName=Mimoto_GoogleLoginToken_InvalidToken_Neg, endPoint=/v1/mimoto/auth/google/token-login, role=userDefinedCookie, templateFields=null, input={ "cookie": "invalid" }, output={ "errorCode": "invalid_token" }, inputTemplate=mimoto/LoginFlow/Authorization/GoogleLoginToken/GoogleLoginToken, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating the sesion token for google login with invalid IDT token and expects it to fail, uniqueIdentifier=TC_Mimoto_GoogleLoginToken_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/auth/google/token-login)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_token invalid_token PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_GoogleLoginToken_Invalid_Provider_Neg

Testcase Input
testCaseName=Mimoto_GoogleLoginToken_Invalid_Provider_Neg, endPoint=/v1/mimoto/auth/invalid/token-login, role=userDefinedCookie, templateFields=null, input={ "cookie": "$GOOGLE_IDT_TOKEN$" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Authorization/GoogleLoginToken/GoogleLoginToken, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating the sesion token for google login with invalid provider, uniqueIdentifier=TC_Mimoto_GoogleLoginToken_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/auth/invalid/token-login)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_GoogleLoginToken_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_GoogleLoginToken_all_Valid_Smoke, endPoint=/v1/mimoto/auth/google/token-login, role=userDefinedCookie, templateFields=null, input={ "cookie": "$GOOGLE_IDT_TOKEN$" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/Authorization/GoogleLoginToken/GoogleLoginToken, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating the sesion token for google login, uniqueIdentifier=TC_Mimoto_GoogleLoginToken_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/auth/google/token-login)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 200 200 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetUserProfile_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_GetUserProfile_all_Valid_Smoke, endPoint=/v1/mimoto/users/me, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "displayName": "Mosip test Cyberpwn", "email": "mosiptestcyberpwn@gmail.com" }, inputTemplate=mimoto/LoginFlow/Users/GetUserProfile/GetUserProfile, outputTemplate=mimoto/LoginFlow/Users/GetUserProfile/GetUserProfileResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get the user profile details for the session login, uniqueIdentifier=TC_Mimoto_GetUserProfile_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/users/me)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
displayName Mosip test Cyberpwn Mosip test Cyberpwn PASS
email mosiptestcyberpwn@gmail.com mosiptestcyberpwn@gmail.com PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_SpaceInWalletName_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_SpaceInWalletName_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": " ", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with space in wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_08
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:103) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_EmptyWalletName_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_EmptyWalletName_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with empty wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_07
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_Empty_WalletPin_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_Empty_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "", "confirmWalletPin": "" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with empty wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_15
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_InvalidWalletName_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_InvalidWalletName_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "********", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with invalid wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_06
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_MissingWalletName_Valid

Testcase Input
testCaseName=Mimoto_CreateWallet_MissingWalletName_Valid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "$REMOVE$", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with missing wallet name, uniqueIdentifier=TC_Mimoto_CreateWallet_09
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 200 200 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_Missing_WalletPin_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_Missing_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "$REMOVE$", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with missing wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_17
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_MoreThan50Characters_WalletName_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_MoreThan50Characters_WalletName_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "abcdefghijklmnopqrstuvwxyz1234567890abcdefghijklmnopqrstuvwxyz", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with more than 50 characters in wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_10
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_MoreThan6Digits_WalletPin_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_MoreThan6Digits_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg3", "walletPin": "12345678", "confirmWalletPin": "12345678" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with wallet pin with more than 6 digits and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_14
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_SameName_Valid

Testcase Input
testCaseName=Mimoto_CreateWallet_SameName_Valid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWallet", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "walletName": "AutomationWallet" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet for the same user with same name with successful login, uniqueIdentifier=TC_Mimoto_CreateWallet_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
walletName AutomationWallet AutomationWallet PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_SessionExpired_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_SessionExpired_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION", "walletName": "AutomationWalletNeg2", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with expired session and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_05
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_Space_WalletPin_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_Space_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": " ", "confirmWalletPin": " " }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with space in wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_16
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_SpecialCharacters_WalletPin_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_SpecialCharacters_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "^%$@*!", "confirmWalletPin": "^%$@*!" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with special characters in wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_20
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_StringValue_WalletPin_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_StringValue_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "abcdef", "confirmWalletPin": "abcdef" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with string value in wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_19
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_WalletNameInNumbers_Valid

Testcase Input
testCaseName=Mimoto_CreateWallet_WalletNameInNumbers_Valid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "5675441", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "walletName": "5675441" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with numbers as wallet name, uniqueIdentifier=TC_Mimoto_CreateWallet_13
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
walletName 5675441 5675441 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_WalletNameInSpecialCharacters_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_WalletNameInSpecialCharacters_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "%$!*&^", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with special characters as wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_12
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_WalletNameWithSpaces_valid

Testcase Input
testCaseName=Mimoto_CreateWallet_WalletNameWithSpaces_valid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "Automation Wallet", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "walletName": "Automation Wallet" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with wallet name contains spaces, uniqueIdentifier=TC_Mimoto_CreateWallet_11
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
walletName Automation Wallet Automation Wallet PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_WalletPin_ConfirmWalletPin_Mismatch_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_WalletPin_ConfirmWalletPin_Mismatch_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "123456", "confirmWalletPin": "654321" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with wallet pin and confirm wallet pin mismatch and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_21
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_WithoutLogin_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_WithoutLogin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "withoutLogin", "cookieName": "SESSION", "walletName": "AutomationWalletNeg1", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating new wallet without login and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_04
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_WithoutUnlock_all_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_CreateWallet_WithoutUnlock_all_Valid_Smoke_sid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletWithoutUnlock", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "walletName": "AutomationWalletWithoutUnlock" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet for the same user with successful login, uniqueIdentifier=TC_Mimoto_CreateWallet_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
walletName AutomationWalletWithoutUnlock AutomationWalletWithoutUnlock PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_Without_WalletPin_And_WalletName_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_Without_WalletPin_And_WalletName_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "$REMOVE$", "walletPin": "$REMOVE$", "confirmWalletPin": "$REMOVE$" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet without wallet pin and wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_22
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_all_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_CreateWallet_all_Valid_Smoke_sid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWallet", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "walletName": "AutomationWallet" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with successful login, uniqueIdentifier=TC_Mimoto_CreateWallet_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
walletName AutomationWallet AutomationWallet PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_CreateWallet_invalid_WalletPin_Neg

Testcase Input
testCaseName=Mimoto_CreateWallet_invalid_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "12345", "confirmWalletPin": "12345" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with invalid wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_18
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsAndCookie#Mimoto_UnlockWallet_Incorrect_WalletPin_Neg

Testcase Input
testCaseName=Mimoto_UnlockWallet_Incorrect_WalletPin_Neg, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "walletPin": "876532" }, output={ "errorCode": "invalid_pin" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet with incorrect wallet Pin and expects it to fail, uniqueIdentifier=TC_Mimoto_UnlockWallet_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/unlock)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_pin invalid_pin PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsAndCookie#Mimoto_UnlockWallet_Invalid_WalletId_Neg

Testcase Input
testCaseName=Mimoto_UnlockWallet_Invalid_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "invalid", "walletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet with invalid wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_UnlockWallet_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/unlock)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsAndCookie#Mimoto_UnlockWallet_Invalid_WalletPin_Neg

Testcase Input
testCaseName=Mimoto_UnlockWallet_Invalid_WalletPin_Neg, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "walletPin": "87653" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet with invalid wallet Pin and expects it to fail, uniqueIdentifier=TC_Mimoto_UnlockWallet_06
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/unlock)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsAndCookie#Mimoto_UnlockWallet_WithoutLogin_Neg

Testcase Input
testCaseName=Mimoto_UnlockWallet_WithoutLogin_Neg, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "withoutLogin", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "walletPin": "123456" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWallet, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet without login session and expects it to fail, uniqueIdentifier=TC_Mimoto_UnlockWallet_04
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/unlock)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsAndCookie#Mimoto_UnlockWallet_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_UnlockWallet_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "walletPin": "123456" }, output={ "walletName": "$ID:CreateWallet_all_Valid_Smoke_sid_walletName$", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWallet, outputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet that is created, uniqueIdentifier=TC_Mimoto_UnlockWallet_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/unlock)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
walletId 648969a5-b2d8-416d-8d8b-0a99a3e4daad 648969a5-b2d8-416d-8d8b-0a99a3e4daad PASS
walletName AutomationWallet AutomationWallet PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORMOSIPIDFROMMIMOTOACTUATOR$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Oauth's details with all valid parameters, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequestForGoogleLogin_01
Messages
Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/v2/oauth-details)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg

Testcase Input
testCaseName=Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORMOSIPIDFROMMIMOTOACTUATOR$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Oauth's details with all valid parameters for Neg scenario, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequestForGoogleLogin_02
Messages
Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/v2/oauth-details)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_ESignet_AuthenticateUserIDPForGoogleLogin_uin_Otp_Valid_ForNeg

Testcase Input
testCaseName=Mimoto_ESignet_AuthenticateUserIDPForGoogleLogin_uin_Otp_Valid_ForNeg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "mimoto/SendOtpEsignet/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthenticateUser/AuthenticateUser, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user to download credentials with all valid parameters for neg scenario, uniqueIdentifier=TC_Mimoto_AuthenticateUserForGoogleLogin_02
Messages
Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/send-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/authenticate)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate#Mimoto_ESignet_AuthenticateUserIDPForGoogleLogin_uin_Otp_Valid_Smoke

Testcase Input
testCaseName=Mimoto_ESignet_AuthenticateUserIDPForGoogleLogin_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "mimoto/SendOtpEsignet/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthenticateUser/AuthenticateUser, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user to download credentials with all valid parameters, uniqueIdentifier=TC_Mimoto_AuthenticateUserForGoogleLogin_01
Messages
Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/send-otp)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/authenticate)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthorizationCode/AuthorizationCode, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate authorization code to download credential issuer, uniqueIdentifier=TC_Mimoto_AuthorizationCodeForGoogleLogin_01
Messages
Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/auth-code)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg

Testcase Input
testCaseName=Mimoto_ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_transactionId$" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthorizationCode/AuthorizationCode, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate authorization code to download credential issuer for Neg scenario, uniqueIdentifier=TC_Mimoto_AuthorizationCodeForGoogleLogin_02
Messages
Request: (End Point URL: https://esignet-mosipid.released.mosip.net/v1/esignet/authorization/auth-code)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidCodeVerifier_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidCodeVerifier_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "invalid", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid code verifier along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_22
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidCode_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidCode_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "invalid", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid code along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_12
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidCredential_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidCredential_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "invalid", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid credential along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_32
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidGrantType_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidGrantType_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "invalid", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid grant type along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_07
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidIssuer_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidIssuer_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "invalid", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid issuer along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_27
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidRedirectUri_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidRedirectUri_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "invalid", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid redirect uri along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_17
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericGrantType_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericGrantType_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "5454453", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric grant type along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_11
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInCodeVerifier_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInCodeVerifier_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "8665542", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric in code verifier along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_26
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInCode_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInCode_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "7554432", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric in code along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_16
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInCredential_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInCredential_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "655671754", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric in credential along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_36
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInIssuer_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInIssuer_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "86654556", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric in issuer along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_31
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInRedirectUri_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInRedirectUri_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "8654678", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric in redirect uri along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_21
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "credentialTypeDisplayName": "MOSIP National ID" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with all valid parameters along with google login, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
credentialTypeDisplayName MOSIP National ID MOSIP National ID PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_DownloadSameVC_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_DownloadSameVC_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"credential_download_error" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading same credential with all valid parameters along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode credential_download_error credential_download_error PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyCodeVerifier_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyCodeVerifier_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty code verifier along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_23
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyCode_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyCode_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty code along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_13
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyCredential_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyCredential_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty credential along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_33
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyGrantType_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyGrantType_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty grant type along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_08
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyIssuer_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyIssuer_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty issuer along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_28
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyRedirectUri_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyRedirectUri_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty redirect uri along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_18
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyRequestBody_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyRequestBody_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "$REMOVE$", "code": "$REMOVE$", "redirectUri": "$REMOVE$", "codeVerifier": "$REMOVE$", "issuer": "$REMOVE$", "credentialConfigurationId": "$REMOVE$", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty request body with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_37
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidWallet_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidWallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "invalid-wallet-id", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid wallet id along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingCodeVerifier_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingCodeVerifier_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$REMOVE$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing code verifier along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_25
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingCode_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingCode_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$REMOVE$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing code along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_15
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingCredential_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingCredential_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "$REMOVE$", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing credential along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_35
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingGrantType_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingGrantType_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "$REMOVE$", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing grant type along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_10
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingIssuer_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingIssuer_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "$REMOVE$", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing issuer along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_30
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingRedirectUri_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingRedirectUri_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$REMOVE$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing redirect uri along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_20
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NullInWallet_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NullInWallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "null", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with null value in wallet id along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_05
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericValueInWallet_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericValueInWallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "145672", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric value in wallet id along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_06
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInCodeVerifier_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInCodeVerifier_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": " ", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in code verifier along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_24
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInCode_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInCode_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in code along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_14
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInCredential_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInCredential_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": " ", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in credential along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_34
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInGrantType_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInGrantType_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": " ", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in grant type along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_09
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInIssuer_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInIssuer_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": " ", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in issuer along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_29
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInRedirectUri_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInRedirectUri_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": " ", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in redirect uri along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_19
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInWallet_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInWallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": " ", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with sapce value in wallet id along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_04
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_WithSessionExpired_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_WithSessionExpired_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Downloading credential with expired google login session and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_40
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_With_Diff_Active_session_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_With_Diff_Active_session_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_WithoutUnlock_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with all valid parameters along with google login when a different session is active and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_38
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_WithoutLogin_Neg

Testcase Input
testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_WithoutLogin_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "withoutLogin", "cookieName": "SESSION" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Downloading credential without google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_39
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_MultipleVC_all_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_MultipleVC_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORINSURANCEFROMMIMOTOACTUATOR$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Getting auth details for downloading multiple sunbird credentials with google login, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequestSunBirdCForGoogleLogin_02
Messages
Request: (End Point URL: https://esignet-insurance.released.mosip.net/v1/esignet/authorization/v2/oauth-details)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_all_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORINSURANCEFROMMIMOTOACTUATOR$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Getting auth details for downloading sunbird credentials with google login, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequestSunBirdCForGoogleLogin_01
Messages
Request: (End Point URL: https://esignet-insurance.released.mosip.net/v1/esignet/authorization/v2/oauth-details)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_ESignet_AuthenticateUserSunBirdCForGoogleLogin_SunBirdC_MultipleVC_Valid_Smoke

Testcase Input
testCaseName=Mimoto_ESignet_AuthenticateUserSunBirdCForGoogleLogin_SunBirdC_MultipleVC_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_MultipleVC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_MultipleVC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "$SUNBIRDINSURANCEAUTHFACTORTYPE$", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthenticateUserSunBirdC/AuthenticateUserSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthenticateUserSunBirdC/AuthenticateUserSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticating user for downloading stayprotected credential with google login, uniqueIdentifier=TC_Mimoto_AuthenticateUserSunBirdCForGoogleLogin_02
Messages
Request: (End Point URL: https://esignet-insurance.released.mosip.net/v1/esignet/authorization/authenticate)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_ESignet_AuthenticateUserSunBirdCForGoogleLogin_SunBirdC_Valid_Smoke

Testcase Input
testCaseName=Mimoto_ESignet_AuthenticateUserSunBirdCForGoogleLogin_SunBirdC_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "$SUNBIRDINSURANCEAUTHFACTORTYPE$", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthenticateUserSunBirdC/AuthenticateUserSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthenticateUserSunBirdC/AuthenticateUserSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticating user for downloading stayprotected credential with google login, uniqueIdentifier=TC_Mimoto_AuthenticateUserSunBirdCForGoogleLogin_01
Messages
Request: (End Point URL: https://esignet-insurance.released.mosip.net/v1/esignet/authorization/authenticate)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_AuthorizationCode_SunBirdCForGoogleLogin_MultipleVC_SunBirdC_All_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_ESignet_AuthorizationCode_SunBirdCForGoogleLogin_MultipleVC_SunBirdC_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_MultipleVC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_MultipleVC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp"}] }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating authorization code for downloading multiple sunbird VC with google login, uniqueIdentifier=TC_Mimoto_AuthorizationCodeSunBirdC_02
Messages
Request: (End Point URL: https://esignet-insurance.released.mosip.net/v1/esignet/authorization/auth-code)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePostForAutoGenId#Mimoto_ESignet_AuthorizationCode_SunBirdCForGoogleLogin_SunBirdC_All_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_ESignet_AuthorizationCode_SunBirdCForGoogleLogin_SunBirdC_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp"}] }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating authorization code for downloading sunbird VC with google login, uniqueIdentifier=TC_Mimoto_AuthorizationCodeSunBirdC_01
Messages
Request: (End Point URL: https://esignet-insurance.released.mosip.net/v1/esignet/authorization/auth-code)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_InvalidLocale_Neg

Testcase Input
testCaseName=Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_InvalidLocale_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdCForGoogleLogin_SunBirdC_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credentialConfigurationId": "InsuranceCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "acceptLanguage": "oo" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading sunbird credential with valid authorizationCode after google login with invalid locale and expects it to fail, uniqueIdentifier=TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_03
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_SpaceInLocale_Neg

Testcase Input
testCaseName=Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_SpaceInLocale_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdCForGoogleLogin_SunBirdC_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credentialConfigurationId": "InsuranceCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "acceptLanguage": " " }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading sunbird credential with valid authorizationCode after google login with space in locale and expects it to fail, uniqueIdentifier=TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_04
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadMultipleStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_DownloadMultipleStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdCForGoogleLogin_MultipleVC_SunBirdC_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credentialConfigurationId": "InsuranceCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "acceptLanguage": "" }, output={ "credentialTypeDisplayName": "Health Insurance" }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading Multiple sunbird credential for policy already downloaded with valid authorizationCode after google login, uniqueIdentifier=TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
credentialTypeDisplayName Health Insurance Health Insurance PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid

Testcase Input
testCaseName=Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdCForGoogleLogin_SunBirdC_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credentialConfigurationId": "InsuranceCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "acceptLanguage": "en" }, output={ "credentialTypeDisplayName": "Health Insurance" }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading sunbird credential with valid authorizationCode after google login, uniqueIdentifier=TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
credentialTypeDisplayName Health Insurance Health Insurance PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId#Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_NumericInLocale_Neg

Testcase Input
testCaseName=Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_NumericInLocale_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdCForGoogleLogin_SunBirdC_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credentialConfigurationId": "InsuranceCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "acceptLanguage": "14" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading sunbird credential with valid authorizationCode after google login with numeric in locale and expects it to fail, uniqueIdentifier=TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_05
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_FetchAllCredentials_Empty_WalletId_And_Empty_Accepted_claims_Neg

Testcase Input
testCaseName=Mimoto_FetchAllCredentials_Empty_WalletId_And_Empty_Accepted_claims_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials with empty wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_03
Output Validation Exception
org.testng.SkipException: known issue. Hence skipping the testcase at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:119) at io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader.test(GetWithParamAndHeader.java:94) at java.base/java.util.ArrayList.forEach(ArrayList.java:1596) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:194) at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:107) ... Removed 23 stack frames

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_FetchAllCredentials_Expired_Session_Neg

Testcase Input
testCaseName=Mimoto_FetchAllCredentials_Expired_Session_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials with expired session and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_07
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_FetchAllCredentials_Invalid_Session_Neg

Testcase Input
testCaseName=Mimoto_FetchAllCredentials_Invalid_Session_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "invalid", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials with invalid session and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_05
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_FetchAllCredentials_Invalid_WalletId_Neg

Testcase Input
testCaseName=Mimoto_FetchAllCredentials_Invalid_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "invalid" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials with invalid wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_FetchAllCredentials_Space_WalletId_Neg

Testcase Input
testCaseName=Mimoto_FetchAllCredentials_Space_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": " " }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials with space wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_04
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_FetchAllCredentials_WithoutUnlock_Wallet_Neg

Testcase Input
testCaseName=Mimoto_FetchAllCredentials_WithoutUnlock_Wallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_WithoutUnlock_all_Valid_Smoke_sid_walletId$" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials without unlocking wallet and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_06
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_FetchAllCredentials_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_FetchAllCredentials_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "acceptLanguage": "en" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials saved for the wallet, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_DownloadCredential_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_ViewCredential_DownloadCredential_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=download, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Download the credential saved for the wallet with credential ID, uniqueIdentifier=TC_Mimoto_ViewCredential_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=download)

Response:

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_EmptyQueryParam_all_Valid

Testcase Input
testCaseName=Mimoto_ViewCredential_EmptyQueryParam_all_Valid, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with credential ID when action query is empty, uniqueIdentifier=TC_Mimoto_ViewCredential_04
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=)

Response:

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_Empty_CredentialId_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_Empty_CredentialId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "404" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with empty credential ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_08
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 404 404 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_Empty_Wallet_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_Empty_Wallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "404" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with empty wallet ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_11
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 404 404 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_InvalidQueryParam_all_Valid

Testcase Input
testCaseName=Mimoto_ViewCredential_InvalidQueryParam_all_Valid, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=invalid, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "400" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with credential ID when action query as invalid, uniqueIdentifier=TC_Mimoto_ViewCredential_06
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=invalid)

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 400 400 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_Invalid_AcceptHeader_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_Invalid_AcceptHeader_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "invalid" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with invalid accept header and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_14
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_Invalid_AcceptLanguage_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_Invalid_AcceptLanguage_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "oo", "acceptHeader": "application/pdf" }, output={ "errorCode": "credential_fetch_error" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with invalid accept language and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_13
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode credential_fetch_error credential_fetch_error PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_Invalid_CredentialId_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_Invalid_CredentialId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "invalid", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "errorCode": "resource_not_found" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with invalid credential ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_07
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode resource_not_found resource_not_found PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_Invalid_Wallet_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_Invalid_Wallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "invalid", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with invalid wallet ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_10
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_MultipleCredential_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_ViewCredential_MultipleCredential_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "$REMOVE$", "acceptHeader": "application/pdf" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the another credential saved for the wallet with credential ID, uniqueIdentifier=TC_Mimoto_ViewCredential_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Response:

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_SpaceIn_AcceptHeader_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_SpaceIn_AcceptHeader_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": " " }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet space in accept header and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_16
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_SpaceIn_AcceptLanguage_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_SpaceIn_AcceptLanguage_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": " ", "acceptHeader": "application/pdf" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with space in accept language and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_14
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Response:

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_SpaceIn_CredentialId_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_SpaceIn_CredentialId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": " ", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "400" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with space in credential ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_09
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 400 400 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_SpaceIn_Wallet_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_SpaceIn_Wallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": " ", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "400" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with space in wallet ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_12
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 400 400 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_SpaceQueryParam_all_Valid

Testcase Input
testCaseName=Mimoto_ViewCredential_SpaceQueryParam_all_Valid, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with credential ID when action query has only space, uniqueIdentifier=TC_Mimoto_ViewCredential_05
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=)

Response:

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_WithExpired_Session_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_WithExpired_Session_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with expired token and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_17
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_Without_AcceptHeader_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_Without_AcceptHeader_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "$REMOVE$" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet without accept header and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_15
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_ViewCredential_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with credential ID, uniqueIdentifier=TC_Mimoto_ViewCredential_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Response:

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteCredentials_EmptyOrSpace_CredentialId_Neg

Testcase Input
testCaseName=Mimoto_DeleteCredentials_EmptyOrSpace_CredentialId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": " " }, output={ "errorCode":"resource_not_found" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the credential empty or space in credential id and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteCredentials_05
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode resource_not_found resource_not_found PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteCredentials_Invalid_CredentialId_Neg

Testcase Input
testCaseName=Mimoto_DeleteCredentials_Invalid_CredentialId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "invalid" }, output={ "errorCode":"resource_not_found" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the credential invalid credential id for the wallet and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteCredentials_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode resource_not_found resource_not_found PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteCredentials_Invalid_WalletId_Neg

Testcase Input
testCaseName=Mimoto_DeleteCredentials_Invalid_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "invalid", "credentialId": "$ID:DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the credential invalid wallet id for the wallet and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteCredentials_04
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteCredentials_MultipleCredentialCreated_valid

Testcase Input
testCaseName=Mimoto_DeleteCredentials_MultipleCredentialCreated_valid, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the credential for the wallet with multiple credentials created, uniqueIdentifier=TC_Mimoto_DeleteCredentials_06
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 200 200 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteCredentials_WithSession_Expired_Neg

Testcase Input
testCaseName=Mimoto_DeleteCredentials_WithSession_Expired_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "withoutLogin", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the credential for the wallet without login and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteCredentials_08
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteCredentials_allReadyDeleted_Neg

Testcase Input
testCaseName=Mimoto_DeleteCredentials_allReadyDeleted_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadMultipleStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$" }, output={ "errorCode":"resource_not_found" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the credential that is already deleted for the wallet and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteCredentials_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode resource_not_found resource_not_found PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteCredentials_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_DeleteCredentials_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadMultipleStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the credential that is saved for the wallet, uniqueIdentifier=TC_Mimoto_DeleteCredentials_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 200 200 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetWallets_WithExpiredSession_Neg

Testcase Input
testCaseName=Mimoto_GetWallets_WithExpiredSession_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/GetWallets/GetWallets, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get list of all the wallets that is present in DB with expired login and expects to fail, uniqueIdentifier=TC_Mimoto_GetWallets_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetWallets_WithoutLogin_Neg

Testcase Input
testCaseName=Mimoto_GetWallets_WithoutLogin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "withoutLogin", "cookieName": "SESSION" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/GetWallets/GetWallets, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get list of all the wallets that is present in DB without login and expects to fail, uniqueIdentifier=TC_Mimoto_GetWallets_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetWallets_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_GetWallets_all_Valid_Smoke, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ }, inputTemplate=mimoto/LoginFlow/Wallet/GetWallets/GetWallets, outputTemplate=mimoto/LoginFlow/Wallet/GetWallets/GetWalletsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all the wallets that is present in DB, uniqueIdentifier=TC_Mimoto_GetWallets_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteWallet_AlreadyDeleted_Neg

Testcase Input
testCaseName=Mimoto_DeleteWallet_AlreadyDeleted_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the wallet that is already deleted and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteWallet_Empty_WalletId_Neg

Testcase Input
testCaseName=Mimoto_DeleteWallet_Empty_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "" }, output={ "errorCode": "internal_server_error" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the wallet with empty wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_04
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode internal_server_error internal_server_error PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteWallet_ExpiredSession_Neg

Testcase Input
testCaseName=Mimoto_DeleteWallet_ExpiredSession_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the wallet with expired login session and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_07
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteWallet_Invalid_WalletId_Neg

Testcase Input
testCaseName=Mimoto_DeleteWallet_Invalid_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "invalid" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the wallet with invalid wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteWallet_Space_WalletId_Neg

Testcase Input
testCaseName=Mimoto_DeleteWallet_Space_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": " " }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the wallet with space wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_05
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteWallet_WithoutLogin_Neg

Testcase Input
testCaseName=Mimoto_DeleteWallet_WithoutLogin_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "withoutLogin", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the wallet without login session and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_06
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_DeleteWallet_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_DeleteWallet_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the wallet that is created, uniqueIdentifier=TC_Mimoto_DeleteWallet_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 200 200 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsAndCookie#Mimoto_UnlockWalletAfterDelete_Neg

Testcase Input
testCaseName=Mimoto_UnlockWalletAfterDelete_Neg, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "walletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWalletAfterDelete/UnlockWalletAfterDelete, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet that is already deleted and expects it to fail, uniqueIdentifier=TC_Mimoto_UnlockWalletAfterDelete_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/unlock)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
errorCode invalid_request invalid_request PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_Logout_WithExpiredSession_Neg

Testcase Input
testCaseName=Mimoto_Logout_WithExpiredSession_Neg, endPoint=/v1/mimoto/logout, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION" }, output={ "responseCode": "404" }, inputTemplate=mimoto/LoginFlow/Authorization/Logout/Logout, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Logout the session with expired login session and expects it to fail, uniqueIdentifier=TC_Mimoto_Logout_03
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/logout)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 404 404 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_Logout_WithoutLogin_Neg

Testcase Input
testCaseName=Mimoto_Logout_WithoutLogin_Neg, endPoint=/v1/mimoto/logout, role=userDefinedCookie, templateFields=null, input={ "cookie": "abcdef", "cookieName": "SESSION" }, output={ "responseCode": "404" }, inputTemplate=mimoto/LoginFlow/Authorization/Logout/Logout, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Logout the session without creating the login session and providing random cookie value and expects it to fail, uniqueIdentifier=TC_Mimoto_Logout_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/logout)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 404 404 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.SimplePost#Mimoto_Logout_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_Logout_all_Valid_Smoke, endPoint=/v1/mimoto/logout, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/Authorization/Logout/Logout, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Logout the session that is created, uniqueIdentifier=TC_Mimoto_Logout_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/logout)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 200 200 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetUserProfileAfterLogout_all_Valid_Smoke

Testcase Input
testCaseName=Mimoto_GetUserProfileAfterLogout_all_Valid_Smoke, endPoint=/v1/mimoto/users/me, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Users/GetUserProfileAfterLogout/GetUserProfileAfterLogout, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get the user profile details for the session login, uniqueIdentifier=TC_Mimoto_GetUserProfileAfterLogout_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/users/me)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader#Mimoto_ViewCredential_AfterLogout_Neg

Testcase Input
testCaseName=Mimoto_ViewCredential_AfterLogout_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet after logout and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_18
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline)

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
status 401 401 PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.DeleteWithParam#Mimoto_ESignet_SunBirdR_DeletePolicy_NOAUTH_Valid_Smoke

Testcase Input
testCaseName=Mimoto_ESignet_SunBirdR_DeletePolicy_NOAUTH_Valid_Smoke, endPoint=/api/v1/Insurance/{insuranceid}, role=resident, templateFields=null, input={ "insuranceid": "$ID:ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" }, output={ "status": "SUCCESSFUL" }, inputTemplate=mimoto/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR, outputTemplate=mimoto/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdRResult, restMethod=delete, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deleting Sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_DeletePolicySunBirdR_01
Messages
Request: (End Point URL: https://registry.released.mosip.net/api/v1/Insurance/{insuranceid})

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
params.status SUCCESSFUL SUCCESSFUL PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetVerifierList_All_Valid_Smoke

Testcase Input
testCaseName=Mimoto_GetVerifierList_All_Valid_Smoke, endPoint=/v1/mimoto/verifiers, role=resident, templateFields=null, input={ }, output={ }, inputTemplate=mimoto/GetVerifierList/GetVerifierList, outputTemplate=mimoto/GetVerifierList/GetVerifierListResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving verifiers list with all valid parameters, uniqueIdentifier=TC_Mimoto_GetVerifierList_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/verifiers)

Response:

Marking test case as passed. As Output validation not performed and no errors in the response

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetIssuerConfiguration_Mosip_All_Valid_Smoke

Testcase Input
testCaseName=Mimoto_GetIssuerConfiguration_Mosip_All_Valid_Smoke, endPoint=/v1/mimoto/issuers/Mosip/configuration, role=resident, templateFields=null, input={ }, output={ "name": "MOSIPVerifiableCredential" }, inputTemplate=mimoto/GetIssuerConfiguration/GetIssuerConfiguration, outputTemplate=mimoto/GetIssuerConfiguration/GetIssuerConfigurationResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving verifiers list with all valid parameters, uniqueIdentifier=TC_Mimoto_GetIssuerConfiguration_01
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/issuers/Mosip/configuration)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
response.(credentials_supported)[0].name MOSIPVerifiableCredential MOSIPVerifiableCredential PASS

back to summary

io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam#Mimoto_GetIssuerConfiguration_With_Issuer_Removed_From_URL_Neg

Testcase Input
testCaseName=Mimoto_GetIssuerConfiguration_With_Issuer_Removed_From_URL_Neg, endPoint=/v1/mimoto/issuers/configuration, role=resident, templateFields=null, input={ }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/GetIssuerConfiguration/GetIssuerConfiguration, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving verifiers list with invalid URL, uniqueIdentifier=TC_Mimoto_GetIssuerConfiguration_02
Messages
Request: (End Point URL: https://api-internal.qa-inji1.mosip.net/v1/mimoto/issuers/configuration)

Response:

Output validation: EXPECTED vs ACTUAL
FieldName Expected Value Actual Value Status
(errors)[0].errorCode RESIDENT-APP-035 RESIDENT-APP-035 PASS

back to summary